Source |
Security Affairs |
Identifiant |
6409264 |
Date de publication |
2022-08-19 08:33:28 (vue: 2022-08-19 09:06:10) |
Titre |
Bumblebee attacks, from initial access to the compromise of Active Directory Services |
Texte |
>Threat actors are using the Bumblebee loader to compromise Active Directory services as part of post-exploitation activities. The Cybereason Global Security Operations Center (GSOC) Team analyzed a cyberattack that involved the Bumblebee Loader and detailed how the attackers were able to compromise the entire network. Most Bumblebee infections started by users executing LNK files which use a system binary to […]
|
Envoyé |
Oui |
Condensat |
>threat able access active activities actors are attackers attacks binary bumblebee center compromise cyberattack detailed directory entire executing lnk exploitation files which from global gsoc how infections initial involved loader most network operations part post security services started system team analyzed the bumblebee the cybereason use users using |
Tags |
|
Stories |
|
Notes |
|
Move |
|