Defending towards the two-pronged assault
For defenders, this implies attribution turns into murkier, looking hypotheses weaker, and earlier detection far more durable. Any.Run warned that reliance on static indicators of compromise akin to domains and URLs is not adequate; they now want to observe habits patterns, fallback routines, and hybrid execution flows for indicators of marketing campaign exercise.
“If Salty infrastructure turns into unavailable, the identical marketing campaign could pivot into Tycoon2FA with out leaving a transparent break,” the researchers famous. “Risk looking ought to search for these transitions to keep away from lacking supporting proof.”
The rise of hybrid 2FA phishing kits ought to put together defenders for campaigns that function extra flexibly, extra modularly, and with a better tolerance for infrastructure failure, the researchers stated.



