
blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti
Preview meta tags from the blog.google website.
Linked Hostnames
17- 7 links toblog.google
- 2 links toabout.google
- 2 links topolicies.google.com
- 1 link toabnormalsecurity.com
- 1 link toboredhumans.com
- 1 link tocommunity.riskiq.com
- 1 link tomsrc.microsoft.com
- 1 link tosafebrowsing.google.com
Thumbnail

Search Engine Appearance
Exposing initial access broker with ties to Conti
Threat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike).
Bing
Exposing initial access broker with ties to Conti
Threat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike).
DuckDuckGo

Exposing initial access broker with ties to Conti
Threat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike).
General Meta Tags
12- titleExposing initial access broker with ties to Conti
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1.0, user-scalable=1.0, minimum-scale=1.0
- optimize_experiments[]
Open Graph Meta Tags
6- og:typearticle
- og:titleExposing initial access broker with ties to Conti
- og:descriptionThreat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigati…
- og:imagehttps://storage.googleapis.com/gweb-uniblog-publish-prod/images/Screenshot_2022-03-16_6.13.19_PM.width-1300.png
- og:site_nameGoogle
Twitter Meta Tags
6- twitter:cardsummary_large_image
- twitter:urlhttps://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
- twitter:titleExposing initial access broker with ties to Conti
- twitter:descriptionThreat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike).
- twitter:image:srchttps://storage.googleapis.com/gweb-uniblog-publish-prod/images/Screenshot_2022-03-16_6.13.19_PM.width-1300.png
Link Tags
10- apple-touch-icon/static/blogv2/images/apple-touch-icon.png?version=pr20250724-1638
- canonicalhttps://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
- icon/favicon.ico
- preconnecthttps://fonts.googleapis.com
- preconnecthttps://fonts.gstatic.com
Emails
1- ?subject=Exposing%20initial%20access%20broker%20with%20ties%20to%20Conti&body=Check out this article on the Keyword:%0A%0AExposing%20initial%20access%20broker%20with%20ties%20to%20Conti%0A%0AThreat Analysis Group (TAG) observed a financially motivated threat actor we refer to as EXOTIC LILY, exploiting a 0day in Microsoft MSHTML (CVE-2021-40444). Investigating this group's activity, we determined they are an Initial Access Broker (IAB) who appear to be working with the Russian cyber crime gang known as FIN12 (Mandiant, FireEye) / WIZARD SPIDER (CrowdStrike).%0A%0Ahttps://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/
Links
25- https://abnormalsecurity.com/blog/bazarloader-contact-form
- https://about.google
- https://about.google/products
- https://blog.google/threat-analysis-group
- https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us