Attackers increasingly using legitimate remote management tools to hack enterprises https://www.csoonline.com/article/3487743/attackers-increasingly-using-legitimate-remote-management-tools-to-hack-enterprises.html
Conversation
Notices
-
Embed this notice
Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Saturday, 24-Aug-2024 14:42:04 JST Patrick C Miller :donor:
-
Embed this notice
ITsec Agentur (itsec_agentur@infosec.exchange)'s status on Sunday, 25-Aug-2024 17:39:22 JST ITsec Agentur
@patrickcmiller reading this and then reading this https://fieldeffect.com/blog/solarwinds-patches-exploited-hardcoded-credentials-vulnerability
In conversation permalink Attachments
-
Embed this notice
Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-Aug-2024 21:17:22 JST Patrick C Miller :donor:
@itsec_agentur dots connected
In conversation permalink -
Embed this notice
Patrick C Miller :donor: (patrickcmiller@infosec.exchange)'s status on Monday, 26-Aug-2024 21:20:54 JST Patrick C Miller :donor:
@monkee shortest path to pwn
In conversation permalink -
Embed this notice
monkee :fairydust: (monkee@chaos.social)'s status on Monday, 26-Aug-2024 21:20:55 JST monkee :fairydust:
@patrickcmiller Why go trough the hassle of sneaking in a Trojan if Corporate already installed one?
In conversation permalink -
Embed this notice
Nikki (encb@infosec.exchange)'s status on Monday, 02-Sep-2024 21:47:21 JST Nikki
@patrickcmiller I loved this quote from the article:
> Less frequently, attackers try to trick prospective targets into installing RMM tools through spear-phishing attacks.
Imagine being so confident to spear-phish someone to get their organization to install RMM tools so that you can more easily hack them later XD
In conversation permalink
-
Embed this notice