close
Gartner Report:
Innovation Insight for
Security Orchestration,
Automation and Response DOWNLOAD NOW

ThreatConnect Shares Incident Information on a Phishing Page Serving Fake Login for University

ThreatConnect incident details a host that is currently serving a phishing page spoofing the legitimate university Webmail login.

We have developed TIPpers, which are incidents the ThreatConnect Research team flags for your awareness, so your organization can take decisive action.

TIPper:  Phishing Page Serves Fake Login for University of California, Irvine

ThreatConnect identified a host that is currently serving a phishing page spoofing the legitimate UCI Webmail login.

ThreatConnect has shared the associated indicators including a host, URL, and IP address in Incident 20161018D: Phishing Page Serves Fake Login for University of California, Irvine.

For additional details, current ThreatConnect users who have an organization account and have had a walkthrough can access this incident by selecting this LINK or by searching for incident “20161018D” in the ThreatConnect Platform.

If you do not have a ThreatConnect account, you can get access to this premium content by following these two steps: 1.) Sign up for a free Organization account.  2.) Get a walkthrough so that we can give you the best experience possible.

ThreatConnect’s Free Organization Edition allows you to establish a basic threat intelligence practice, collaborate with your internal team, protect your organization with open source threat data, bulk import cyberthreat indicators, contribute to the ThreatConnect Community, and receive support and validation from outside researchers and analysts also using the platform. The TIPper Community includes timely notification of threat incidents identified by the ThreatConnect Research team, an exclusive service offered at no additional charge to paying customers.

 

ABOUT THE AUTHOR

The ThreatConnect Research Team: is an elite group of globally-acknowledged cybersecurity experts, dedicated to tracking down existing and emerging cyber threats. We scrutinize trends, technology and socio-political motivators to develop comprehensive knowledge of the cyber landscape. Then, we share what we’ve learned so that you can protect your organization, and your team can take precise action against threats.