Threat Analysis Group

Exposing initial access broker with ties to Conti



EXOTIC LILY attack chain

One of the fake social media profiles created by EXOTIC LILY

One of the fake social media profiles created by EXOTIC LILY

Example of an EXOTIC LILY phishing email impersonating as an employee of a legitimate company

Example of an EXOTIC LILY phishing email impersonating as an employee of a legitimate company

Attacker uses a file-sharing service email notification feature to send BazarLoader ISO payload

Attacker uses a file-sharing service email notification feature to send BazarLoader ISO payload

Breakdown of actor’s communication activity. Deeper color indicates more activity.

Breakdown of actor’s communication activity. Deeper color indicates more activity.
local path