{"id":105703,"date":"2025-03-05T12:11:09","date_gmt":"2025-03-05T04:11:09","guid":{"rendered":"https:\/\/version-2.com\/?p=105703"},"modified":"2025-03-13T12:14:20","modified_gmt":"2025-03-13T04:14:20","slug":"dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/03\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/","title":{"rendered":"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"105703\" class=\"elementor elementor-105703\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><div class=\"meta\">\u00a0<\/div><div id=\"content-c11391465\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em><span lang=\"EN-US\" data-uw-rm-lang=\"false\">The latest ESET APT Activity Report shows improved phishing techniques that threat actors currently utilize, highlighting the need for high-quality cybersecurity awareness training. <\/span><\/em><\/p><p>A general recommendation about phishing attacks is not to click on anything that looks suspicious. That\u2019s easy to follow when employees receive an email full of grammatical errors and typos from an unknown source.<\/p><p>However, adversaries have been improving their tactics and experimenting with new ways to make their potential victims fall for phishing \u2014 tactics that may not be so easy to spot. And it\u2019s not only about using AI to create grammatically correct or more convincing emails. Recently, ESET researchers noticed a ne<a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-apt-activity-report-q2-2024-q3-2024\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-apt-activity-report-q2-2024-q3-2024\/\" aria-label=\"w trend among North Korea-aligned groups - open in a new tab\" data-uw-rm-ext-link=\"\">w trend among North Korea-aligned groups<\/a> trying to build relationships with their targets before sending them malicious content.<\/p><p>Statistically speaking, since <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" aria-label=\"human error is involved in most data breaches - open in a new tab\" data-uw-rm-ext-link=\"\">human error is involved in most data breaches<\/a>, it is logical that threat actors don\u2019t hesitate to leverage this major attack vector. To address this, ESET created<a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/?srsltid=AfmBOooXvRHLjaFxt9gszMu8jQZG1UioKeT4tbLdDUSynC-ewiwzWmN1\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/?srsltid=AfmBOooXvRHLjaFxt9gszMu8jQZG1UioKeT4tbLdDUSynC-ewiwzWmN1\" aria-label=\"ESET Cybersecurity Awareness Training - open in a new tab\" data-uw-rm-ext-link=\"\"> ESET Cybersecurity Awareness Training<\/a>, a story-driven course available in English, French, Spanish, and Chinese languages informing employees about current cyber threats and helping businesses with compliance and insurance issues.<\/p><\/div><div id=\"content-c11392287\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\" role=\"heading\" data-uw-rm-heading=\"level\" aria-level=\"2\">A costly mistake<\/h3><\/header><p>Verizon\u2019s <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" aria-label=\"2024 Data Breach Investigations Report - open in a new tab\" data-uw-rm-ext-link=\"\">2024 Data Breach Investigations Report <\/a>shows that 68% of breaches involved a non-malicious human element, like a person falling victim to a social engineering attack or making an error.<\/p><p>Most of those attacks started with <a href=\"https:\/\/www.eset.com\/int\/phishing\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.eset.com\/int\/phishing\/\" aria-label=\"phishing - open in a new tab\" data-uw-rm-ext-link=\"\">phishing <\/a>(tricking a user into giving sensitive information or downloading malicious content) and <a href=\"https:\/\/www.ibm.com\/topics\/pretexting#:~:text=Pretexting%20is%20use%20of%20a,the%20organization%20they%20work%20for.\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.ibm.com\/topics\/pretexting#:~:text=Pretexting%20is%20use%20of%20a,the%20organization%20they%20work%20for.\" aria-label=\"pretexting - open in a new tab\" data-uw-rm-ext-link=\"\">pretexting <\/a>(use of a fabricated story, or pretext, to gain a victim&#8217;s trust) via email, accounting for 73% of breaches.<\/p><p>In 2024, the number of detected breaches involving pretexting surpassed the number of breaches involving traditional phishing attacks, according to Verizon\u2019s data. This could be one indicator that threat actors feel the need to use more sophisticated techniques against their targets, according to the report.<\/p><p>Breaches involving a human element are not only prevalent but also costly, according to IBM\u2019s <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.ibm.com\/reports\/data-breach\" aria-label=\"Cost of a Data Breach Report 2024 - open in a new tab\" data-uw-rm-ext-link=\"\">Cost of a Data Breach Report 2024<\/a> conducted by Ponemon Institute. Ponemon\u2019s researchers looked at 604 organizations in 16 countries and regions, finding that an average business loss due to phishing has now reached USD4.88 million per breach. This makes phishing attacks the second costliest type of attack, right after impacts from malicious insiders, which account for an average of USD4.99 million.<\/p><\/div><div id=\"content-c11392288\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">I have a proposal for you<\/h3><\/header><p>Recent <a class=\"findings\" title=\"confirm\" href=\"http:\/\/Recent\" target=\"ESET\" data-uw-rm-brl=\"FX\" data-uw-original-href=\"http:\/\/recent\/\" aria-label=\"eset findings - target website may not be available\" data-uw-rm-ext-link=\"\">ESET findings<\/a> confirm this trend of threat actors utilizing improved social engineering techniques.<\/p><p>In Q2 2024\u2013Q3 2024, ESET researchers saw the North Korea-aligned activity cluster Deceptive Development and North Korea-aligned group Kimsuky enhancing their phishing attacks with pretexting methods. For example, both tried to use fake job offers to approach the targeted individuals, and only after the victim responded and a relationship was established did threat actors send a malicious package to the victim.<\/p><p>Another group, Lazarus, distributed fake job offers for desirable positions at large companies like Airbus or BAE Systems and delivered trojanized PDF viewers along with decoy PDF documents. This group also impersonated recruiters on professional networks and work platforms, distributing trojanized codebases under the guise of job assignments and hiring challenges with the aim of cryptocurrency theft.<\/p><p>Kimsuky targeted North Korea experts working for NGOs and researchers in academic circles with fake requests to grant a media interview or give a presentation. They tried to establish a relationship with a good old apple-polishing \u2015 sending amiable emails that praised the target\u2019s expertise and asked for help. Once the attackers gained the trust of their victim, Kimsuky delivered a malicious package, usually disguised as a list of questions that should be answered before the event.<\/p><p>The BlackBasta ransomware gang also adopted this relationship-oriented method when targeting businesses, according to the <a href=\"https:\/\/blog.knowbe4.com\/blackbasta-ransomware-gang-uses-new-social-engineering-tactics\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/blog.knowbe4.com\/blackbasta-ransomware-gang-uses-new-social-engineering-tactics\" aria-label=\"recent discovery - open in a new tab\" data-uw-rm-ext-link=\"\">recent discovery <\/a>of the ReliaQuest threat research team.<\/p><p>First, they send mass email spam targeting employees, provoking them to create a legitimate help-desk ticket to resolve the issue. Then, attackers posing as IT support or help desk staff contact employees via Microsoft Teams chat and send them a malicious QR code, likely for downloading a remote monitoring and management (RMM) tool that BlackBasta can exploit.<\/p><\/div><div id=\"content-c11392289\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">How to avoid a toxic relationship<\/h3><\/header><p>Seeing the above-mentioned cases, it is clear that employees are a critical component of any business\u2019s security that needs to be taken care of. In general, cybersecurity awareness training not only helps businesses to deflect user-oriented cyberattacks and fulfill compliance\/insurance requirements but also decreases losses in case of a successful breach by <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.ibm.com\/reports\/data-breach\" aria-label=\"around 5.2% - open in a new tab\" data-uw-rm-ext-link=\"\">around 5.2%<\/a>.<\/p><p>ESET acknowledges this threat vector with the global launch of <a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/\" aria-label=\"ESET Cybersecurity Awareness Training - open in a new tab\" data-uw-rm-ext-link=\"\">ESET Cybersecurity Awareness Training<\/a>, which complements <a href=\"https:\/\/www.eset.com\/int\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.eset.com\/int\/business\/small-and-medium\/\" aria-label=\"ESET PROTECT - open in a new tab\" data-uw-rm-ext-link=\"\">ESET PROTECT<\/a>, a multilayered AI-powered solution for businesses.<\/p><p>Both employee training and multilayered security are integral parts of what ESET calls a prevention-first approach designed to completely evade cyber threats or mitigate them with no or only minimal disruptions in the business flow. It is a complex strategy of shrinking the attack surface while effectively reducing the complexity of cyber defense.<\/p><p><a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/\" aria-label=\"ESET Cybersecurity Awareness Training - open in a new tab\" data-uw-rm-ext-link=\"\">ESET Cybersecurity Awareness Training<\/a> aims for both of these goals. First, it helps employees to recognize standard and novel cybersecurity threats abusing human factors. Second, it is easy to deploy and operate thanks to deep integration possibilities with various systems, a customizable training portal, and an easy-to-use dashboard. Thus, businesses don\u2019t need to spend more precious IT staff time on it than necessary.<\/p><\/div><div id=\"content-c11392290\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Let\u2019s make it interesting!<\/h3><\/header><p><a href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/\" target=\"_blank\" rel=\"noopener\" data-uw-rm-brl=\"PR\" data-uw-original-href=\"https:\/\/www.eset.com\/us\/business\/cybertraining\/\" aria-label=\"ESET Cybersecurity Awareness Training - open in a new tab\" data-uw-rm-ext-link=\"\">ESET Cybersecurity Awareness Training <\/a>offers an engaging and story-driven experience that helps employees understand which common bad user habits of can endanger the whole company. It also explains how threat actors think \u2014 for example, how they search potential victims\u2019 social network profiles to guess their passwords or impersonate them.<\/p><p>The training is based on three decades of ESET expertise in this area and is designed to change employee behavior, rather than merely to check a box for compliance or cyber insurance.<\/p><p>To keep employees vigilant in the long term, ESET Cybersecurity Awareness Training comes with phishing test simulations that businesses can run an unlimited number of times.<\/p><p><strong>Benefits of Premium Cybersecurity Awareness Training <\/strong><\/p><ul><li>Comprehensive online cybersecurity awareness training courses<\/li><li>Multiple course options ranging from full 90-minute-long training to short courses taking from 5 to 15 minutes<\/li><li>Best practices for remote employees<\/li><li>Gamification that engages and changes behavior<\/li><li>Helps meet HIPAA, PCI, SOX, GDPR, CCPA compliance requirements<\/li><li>Helps meet cyber insurance requirements<\/li><li>Certification &amp; LinkedIn badge<\/li><li>Unlimited phishing test simulations to test employees<\/li><li>Admin console allowing users to manage customizable groups of employees, track learners\u2019 status, and run phishing simulation campaigns<\/li><li>School platform where employees can take their enrolled training<\/li><li>Automatic email reminders to learners<\/li><li>Deep integration with various popular third-party cloud-based services<\/li><\/ul><\/div><div id=\"content-c11392291\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Fruitful relationship with ESET<\/h3><\/header><p>Even the best and most expensive cybersecurity solution in the world can be powerless against one fooled employee who shares their password or downloads a malicious file.<\/p><p>Help your employees to navigate through a maze of the evolving world of cyber threats and improve your defenses with ESET Cybersecurity Awareness Training.<\/p><\/div><footer class=\"article-footer\"><\/footer><\/div><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 The latest ESET APT Activity Report shows improved ph [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,40,61],"tags":[41,1077],"class_list":["post-105703","post","type-post","status-publish","format-standard","hentry","category-1305","category-eset","category-press-release","tag-eset","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dangerous liaisons in cybersecurity: Attackers improve their phishing methods - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 The latest ESET APT Activity Report shows improved ph [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-05T04:11:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T04:14:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/us\\\/about\\\/newsroom\\\/corporate-blog\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2025\\\/03\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods\",\"datePublished\":\"2025-03-05T04:11:09+00:00\",\"dateModified\":\"2025-03-13T04:14:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2025\\\/03\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/\"},\"wordCount\":1157,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"ESET\",\"2025\"],\"articleSection\":[\"2025\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/us\\\/about\\\/newsroom\\\/corporate-blog\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2025\\\/03\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/us\\\/about\\\/newsroom\\\/corporate-blog\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/\",\"name\":\"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2025-03-05T04:11:09+00:00\",\"dateModified\":\"2025-03-13T04:14:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/us\\\/about\\\/newsroom\\\/corporate-blog\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/us\\\/about\\\/newsroom\\\/corporate-blog\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/us\\\/about\\\/newsroom\\\/corporate-blog\\\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/","og_locale":"zh_HK","og_type":"article","og_title":"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods - Version 2","og_description":"\u00a0 The latest ESET APT Activity Report shows improved ph [&hellip;]","og_url":"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/","og_site_name":"Version 2","article_published_time":"2025-03-05T04:11:09+00:00","article_modified_time":"2025-03-13T04:14:20+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2025\/03\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods","datePublished":"2025-03-05T04:11:09+00:00","dateModified":"2025-03-13T04:14:20+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2025\/03\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/"},"wordCount":1157,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["ESET","2025"],"articleSection":["2025","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2025\/03\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/","url":"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/","name":"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2025-03-05T04:11:09+00:00","dateModified":"2025-03-13T04:14:20+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/dangerous-liaisons-in-cybersecurity-attackers-improve-their-phishing-methods\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Dangerous liaisons in cybersecurity: Attackers improve their phishing methods"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ruT","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/105703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=105703"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/105703\/revisions"}],"predecessor-version":[{"id":105710,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/105703\/revisions\/105710"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=105703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=105703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=105703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}