ThreatConnect details Cancer Foundation Domain Squat Incident

ThreatConnect Shares Incident Information on BC Cancer Foundation Domain Squat

We have developed TIPpers, which are incidents the ThreatConnect Research team flags for your awareness, so your organization can take decisive action.

TIPper: Adversary using ‘Obi Onyeka’ Registrant Name Registers Site Spoofing BC Cancer Foundation.

ThreatConnect identified a website spoofing the BC Cancer Foundation on a domain registered by a threat actor that often uses the name ‘Obi Onyeka’ to register domain squats and phishing pages.

ThreatConnect has shared the associated indicators including host and IP address in Incident 20161018B: Adversary using ‘Obi Onyeka’ Registrant Name Registers Site Spoofing BC Cancer Foundation.

For additional details, current ThreatConnect users who have an organization account and have had a walkthrough can access this incident by selecting this LINK or by searching for incident  “20161018B” in the ThreatConnect Platform.

If you do not have a ThreatConnect account, you can get access to this premium content by following these two steps: 1.) Sign up for a free Organization account. 2.) Get a walkthrough so that we can give you the best experience possible.

ThreatConnect’s Free Organization Edition allows you to establish a basic threat intelligence practice, collaborate with your internal team, protect your organization with open source threat data, bulk import cyberthreat indicators, contribute to the ThreatConnect Community, and receive support and validation from outside researchers and analysts also using the platform. The TIPper Community includes timely notification of threat incidents identified by the ThreatConnect Research team, an exclusive service offered at no additional charge to paying customers.

About the Author
ThreatConnect Research Team

The ThreatConnect Research Team: is an elite group of globally-acknowledged cybersecurity experts, dedicated to tracking down existing and emerging cyber threats. We scrutinize trends, technology and socio-political motivators to develop comprehensive knowledge of the cyber landscape. Then, we share what we’ve learned so that you can protect your organization, and your team can take precise action against threats.