A Phishing-as-a-service offering on the dark web bypasses MFA. The Worok cyberespionage group is active in Central Asia and the Middle East. Prynt Stealer and the evolution of commodity malware. Sharkbot malware reemerged in Google Play. BlackCat/ALPHV claims credit for attack on the Italian energy sector. Joe Carrigan shares stats on social engineering. Our guest is Angela Redmond from BARR Advisory with six cybersecurity KPIs. And the Los Angeles Unified School District was hit with ransomware.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/171\n\nSelected reading.\nEvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web (Resecurity)\nWorok: The big picture (WeLiveSecurity)\xa0\nDev backdoors own malware to steal data from other hackers (BleepingComputer)\xa0\nThe Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminals (Security Affairs)\nFake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan (The Hacker News)\nSharkBot malware sneaks back on Google Play to steal your logins (BleepingComputer)\xa0\nBlackCat ransomware claims attack on Italian energy agency (BleepingComputer)\n11.84GB of United States Military Contractor and Military Reserve data has been leaked. (vx-underground)\nHackers honeytrap Russian troops into sharing location, base bombed: Report (Newsweek)\xa0\nLAUSD hit by hackers in apparent cyber attack (FOX 11 Los Angeles)\nLos Angeles Unified Targeted by Ransomware Atta (Los Angeles Unified School District)\nLearn more about your ad choices. Visit megaphone.fm/adchoices