HomeVulnerabilityHome windows flaw exploited as zero-day by extra teams than beforehand thought

Home windows flaw exploited as zero-day by extra teams than beforehand thought

Preliminary entry occurred via Cisco firewall

Symantec discovered proof that the attackers gained entry to the sufferer’s community via a Cisco ASA firewall after which pivoted to a Home windows machine. The researchers didn’t reveal if this entry was achieved by exploiting a vulnerability or through the use of weak or compromised credentials, however zero-day assaults towards network-edge units akin to firewalls, VPN gateways and different security home equipment have grow to be quite common over the previous two years.

Despite the fact that most of those zero-day assaults are the work of nation state teams with important assets and funding, as soon as a vulnerability is revealed and an exploit turns into out there, different forms of attackers are additionally prone to attempt to capitalize on it.

Attackers managed to deploy infostealer

On this assault, the Balloonfly group didn’t get to the stage of deploying the Play ransomware, as that’s normally one of many last levels when attackers have management over important elements of the community for max harm. Nonetheless, the group did deploy an infostealer referred to as Grixba that’s normally a part of its toolset.

See also  From reactive to proactive: Redefining incident response with unified, cloud-native XDR
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular