Get a Pentest and security assessment of your IT network.

Cyber Security

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

The SolarWinds cyberattack was known for its sophistication in the breadth of tactics used to infiltrate and persist in the target infrastructure. Microsoft called the threat actor behind the campaign “skillful and methodic operators who follow OpSec” best practices to minimize traces, stay under the radar, and avoid detection” RiskIQ said it identified an additional set of 18 servers with high confidence that likely communicated with secondary Cobalt Strike payloads delivered via the TEARDROP and RAINDROP malware, representing a 56% jump in the attacker’s known command-and-control footprint.

Source: https://thehackernews.com/2021/04/researchers-find-additional.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security