Andrew 🌻 Brandt 🐇<p>It sometimes pays to run domains that serve purely as spam honeypots. Case in point: A spammer has been delivering a ConnectWise commercial remote access client application as a payload in a scam that uses the purported arrival of a US Social Security statement as its hook.</p><p>A 🧵 ...</p><p><a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ConnectWise</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/spam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spam</span></a> <a href="https://infosec.exchange/tags/malspam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malspam</span></a> <a href="https://infosec.exchange/tags/attacksurface" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacksurface</span></a> <a href="https://infosec.exchange/tags/SocialSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialSecurity</span></a> <a href="https://infosec.exchange/tags/SocialSecurityAdministration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialSecurityAdministration</span></a> <a href="https://infosec.exchange/tags/SSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSA</span></a> <a href="https://infosec.exchange/tags/usgov" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usgov</span></a></p>