A May 14 report from threat intelligence analysts at Cyfirma, has revealed that Group123 is taking aim at Windows systems with the Windows Credential Manager firmly in mind for the harvesting of credentials. Group 123, known by a multitude of aliases including Cloud Dragon, InkySquid, Reaper, Red Eyes, and ScarCruft, among others, has been observed using custom malware and leveraging Windows application programming interface calls in ongoing attacks. Initial access is by way of, yes, you probably guessed by now, phishing email campaigns, and target vulnerabilities in Microsoft Office, web servers and assorted internet-facing applications. The report has confirmed that the attackers will also deploy disk wipers and conduct ransomware operations during some of their campaigns.

Read more here.