Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Lookout Research: Novel Phishing Threats Target Cryptocurrency, Driving Need for Robust Endpoint Security
Acceleration Economy Minute

Lookout Research: Novel Phishing Threats Target Cryptocurrency, Driving Need for Robust Endpoint Security

Kieron AllenBy Kieron AllenMarch 8, 2024Updated:March 8, 20242 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email
AE Network minute logo

In episode 122 of the Acceleration Economy Minute, Kieron Allen and guest Chris Hughes take a look at new research from Lookout that exposes novel phishing techniques and sheds light on the importance of endpoint security.

Highlights

00:21 — New research from Lookout unearthed novel phishing techniques targeting various cryptocurrency platforms and the Federal Communications Commission (FCC). They’re essentially tricking the users into logging into malicious and fake websites.

01:15 — They are mimicking the authentication workflows that you might be using for a single sign-on, like one from Okta. These are widely trusted identity providers that are used in large enterprise environments, so users feel comfortable. It has some advanced techniques like using CAPTCHAs. Everything seems normal.

01:56 — It’s capturing credentials and sensitive data (usernames, passwords, and authentication tokens). You get login credentials and information from users, which can be used to authenticate access into environments they may have access to and move laterally between other organizations, environments, and systems — maybe even systems with more sensitive data.

Ask Cloud Wars AI Agent about this analysis

02:49 — You can even persist in those environments if the organization doesn’t understand or know that a current account has been compromised. It’s a pretty nefarious technique: social engineering combined with some technical competency to trick people.

03:22 — It’s a complex phishing kit, as Lookout described it, due to the fact that users are directed to provide secondary authentication and that they’re directing users to third-party web pages. It seems like a lengthy process. It’s an incredibly relevant and stark example of how effective phishing can be.

04:15 — Endpoint security is key here. Companies like Lookout can identify behaviors and techniques and notify users, “Hey, this seems to be nefarious.” They have identified these techniques in the wild, and they’re feeding it back into their platform. That way, they can integrate it into their offering and provide that heads-up.


Guidebook: Endpoint & Mobile Data Protection

Interested in Lookout?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

authentication Cybersecurity featured Featured Minute Lookout phishing workflow
Share. Facebook Twitter LinkedIn Email
Analystuser

Kieron Allen

Cloud, AI, Innovation
Cloud Wars analyst

Areas of Expertise
  • Business Apps
  • Cloud
  • Cybersecurity
  • Data
  • LinkedIn

Kieron Allen is a Cloud Wars Analyst examining innovations in, and the future impact of, the latest AI, cloud, cybersecurity, and data technology developments. In his ongoing analyses and video reports, Allen focuses on the platforms, applications, people, and ideas that will mold our digital future. After serving as the Online Editor for BBC Sky at Night Magazine and as the Editorial Assistant for BBC Focus Magazine, Kieron became a freelance journalist in 2015 where his focus on the business technology market became a key passion. Kieron partners with technology start-ups and organizations that share his interests in science, social affairs, non-profit work, fashion and the arts.

  Contact Kieron Allen ...

Related Posts

Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance

June 24, 2025

AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country

June 24, 2025

Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration

June 24, 2025

AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’

June 24, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Microsoft, Gong Detail How AI and Integration Partnership Drives Higher Sales Performance
  • AI Industrialization of America Rolls On as AWS Plans Data Centers in Coal Country
  • Snowflake to Acquire Crunchy Data to Power Agentic AI with PostgreSQL Integration
  • AWS Data Centers Opening in Coal Country: ‘AI-Industrialization’
  • Larry Ellison Declares Oracle Will Be #1 in Cloud Databases, Apps, and AI Data Centers

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.