• XSS.stack #1 – первый литературный журнал от юзеров форума

The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access

Lipshitz

(L3) cache
Пользователь
Регистрация
26.11.2021
Сообщения
221
Реакции
114
How it started:
In early February 2022 Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever worked. The investigation began when an alert from a custom detection signature Volexity had deployed at a customer site (“Organization A”) indicated a threat actor had compromised a server on the customer’s network. While Volexity quickly investigated the threat activity, more questions were raised than answers due to a very motivated and skilled advanced persistent threat (APT) actor, who was using a novel attack vector Volexity had not previously encountered.....

How it finished:
A file named servtask.bat had invoked the Microsoft command-line registry utility and PowerShell to run the following commands:
  • reg save hklm\sam C:\ProgramData\sam.save
  • reg save hklm\security C:\ProgramData\security.save
  • reg save hklm\system C:\ProgramData\system.save
  • Powershell -c “Get-ChildItem C:\ProgramData\sam.save, C:\ProgramData\security.save, C:\ProgramData\system.save ^| Compress-Archive -DestinationPath C:\ProgramData\out.zip”

1732371366461.png


 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх