Make certain current detection policies and protection answers can keep an eye on and think about blocking recognized atomic and computed indicators connected with this assault. According to Subject Impact, the credential harvesting login webpages employed Axios’s infrastructure to capture and make use of the credentials to login into the suffer