@GossiTheDog@cyberplace.social I looked it up. Everything but that subheader seems to be fine, the author was pointing out tactics.
WinRAR corresponds to this: https://attack.mitre.org/techniques/T1560/
Conversation
Notices
-
Embed this notice
M.O.M.O. (momo@mk.absturztau.be)'s status on Sunday, 28-Jul-2024 00:52:03 JST M.O.M.O. -
Embed this notice
Alex (alex02@cyberplace.social)'s status on Sunday, 28-Jul-2024 03:32:25 JST Alex @GossiTheDog missing 7zip.
In conversation permalink -
Embed this notice
Jason Haar :laserkiwi: (jhaar@mastodon.nz)'s status on Sunday, 28-Jul-2024 06:16:07 JST Jason Haar :laserkiwi: @Paxxi @GossiTheDog as was mentioned earlier, these tools are TACTICS, not declared as malware. They are commonly used by criminals during compromises, so it is prudent for orgs to track such activity. Of course that means dealing with false positives when your staff include people like those in this thread...
In conversation permalink -
Embed this notice
Pär Björklund (paxxi@hachyderm.io)'s status on Sunday, 28-Jul-2024 06:16:08 JST Pär Björklund @GossiTheDog procdump is kinda funny since it's Microsofts own tool
In conversation permalink
-
Embed this notice