You are the Cybersecurity Lead for a program supporting the United States Indo Pacific Command (INDOPACOM). Review the TTPs and interests of the PANDA threat actors described in the C
You are the Cybersecurity Lead for a program supporting the United States Indo Pacific Command (INDOPACOM).
Review the TTPs and interests of the PANDA threat actors described in the Crowdstrike Global Threat Report (2022) in Electronic Reserves.
Identify how PANDA threat actors may present a danger to the data critical to your agency’s mission. Identify at least three attack vectors this actor is likely to use to compromise the data critical to your agency’s mission and how they are a threat to INDOPACOM data.
2022 Global Threat Report CrowdStrike 2
F or security teams on the front lines and those of us in the business of stopping cyberattacks and breaches, 2021 provided no rest for the weary. In the face of massive disruption brought about by the COVID- driven social, economic and technological shifts of 2020, adversaries
refined their tradecraft to become even more sophisticated and brazen. The result was a series of high-profile attacks that rocked many organizations and, on their own, represented watershed moments in cybersecurity.
As organizations scrambled at the start of 2021 to protect supply chains and interconnected systems in the face of the incredibly sophisticated Sunburst attack, adversaries exploited zero-day vulnerabilities and architectural limitations in legacy systems like Microsoft to leave many reeling. At the same time, eCrime syndicates refined and amplified big game hunting (BGH) ransomware attacks that ripped across industries, sowing devastation and sounding the alarm on the frailty of our critical infrastructure.
For security teams already dealing with an ongoing skills shortage, these issues proved challenging enough on their own. But the strain on security teams was amplified even more at the end of the year when the ubiquitous Log4Shell vulnerability threatened a complete security meltdown.
Understanding these events gives visibility into the shifting dynamics of adversary tactics, which is critical for staying ahead of today’s threats. This is the context that the CrowdStrike 2022 Global Threat Report delivers. Developed based on the firsthand observations of our elite CrowdStrike Intelligence and Falcon OverWatch™ teams, combined with insights drawn from the vast telemetry of the CrowdStrike Security Cloud, this year’s report provides crucial insights into what security teams need to know about an increasingly ominous threat landscape.
Foreword
The CrowdStrike 2022 Global Threat Report provides crucial insights into what security teams need to know about to stay ahead of today's threats in an increasingly ominous threat landscape.
2022 Global Threat Report CrowdStrike 3
Among the details you’ll learn in this year’s report:
How state-sponsored adversaries targeted IT and cloud service providers to exploit trusted relationships and supply chain partners
How state-sponsored adversaries weaponized vulnerabilities to evade detection and gain access to critical applications and infrastructure
How sophisticated adversaries exploited stolen credentials and identities to amplify ransomware BGH attacks and infiltrate cloud environments
How malicious actors intensified attacks on critical cloud infrastructure with new, sophisticated approaches
Our annual report also paints a picture that shows enterprise risk is coalescing around three critical areas: endpoints and cloud workloads, identity and data. Threat actors continue to exploit vulnerabilities across endpoints and cloud environments, and ramp up innovation on how they use identities and stolen credentials to bypass legacy defenses — all to reach their goal, which is your data. CrowdStrike has observed that 62% of attacks comprise non-malware, hands-on-keyboard activity. As adversaries advance their tradecraft in this manner to bypass legacy security solutions, autonomous machine learning alone is not good enough to stop dedicated attackers.
CrowdStrike is relentless in our drive to keep you ahead of adversaries today and into the future. To meet the adversaries head-on, we’re unifying a modern approach to security with a platform that connects the machine both to the identity and the data to deliver full Zero Trust protection. As adversaries shift to targeting cloud workloads, we’re providing deep visibility and proactive security across the entire cloud-native stack. To alleviate the burden of the constant cycle of patching, we’re prioritizing the vulnerabilities that create the most risk. And for the most sophisticated attacks, we’ve delivered powerful new extended detection and response (XDR) capabilities to help overwhelmed security teams automate response and reduce the time it takes to hunt across domains.
2021 taught us that no matter how much adversity we face, the adversary will not rest. Attacks are growing more destructive, causing mass disruption in all aspects of our daily lives. But this is the challenge we’ve accepted and a fight that we will win together. I hope you find this report informative and that it gives you the same clarity of purpose it gives me: to be unrelenting in our drive to stop adversaries from stopping business and our way of life.
George Kurtz
CrowdStrike CEO and Co-Founder
Enterprise risk is coalescing around three critical areas:
Endpoints and cloud workloads Identity Data
2022 Global Threat Report CrowdStrike 4
Table of Contents
Introduction
Naming Conventions
Threat Landscape Overview
2021 Themes
Ransomware and the Ever-adaptable Adversary
Iran and the New Face of Disruptive Operations
China Emerges as Leader in Vulnerability Exploitation
Log4Shell Sets the Internet on Fire
Increasing Threats to Cloud Environments
Conclusion
Recommendations
About CrowdStrike
CrowdStrike Products and Services
5
7
8
11
11
14
16
19
22
26
27
29
30
2022 Global Threat Report CrowdStrike 5
A s we reflect upon 2021, two overarching themes come to the forefront: adaptability and perseverance. Businesses are finding paths forward with new technologies and solutions, adapting in the face of adversity and persevering in spite of uncertainty as we continue to navigate the
challenges of living through a global pandemic. While these issues will ultimately lead to strength and innovation in organizations around the world, they will also create new risks and vulnerabilities that can be exploited.
Cyber adversaries kept pace in 2021 with many adapting to a changing target landscape. This trend was perhaps best exemplified by the shifts observed in the 2021 eCrime ecosystem, which — while remaining vast and interconnected — comprises many criminal enterprises that exist to support big game hunting (BGH) ransomware operations. Notably, adversaries in 2021 were able to circumvent actions that threatened cessation of their operations, and some even resorted to rebranding as a result. Despite new approaches taken by law enforcement, including attempts to seize ransom payments and criminal funds before they reached adversaries’ hands, CrowdStrike Intelligence observed an 82% increase in ransomware-related data leaks in 2021, compared to 2020. This increase, coupled with other data leaks, is a stark reminder of the value that adversaries place on victim data.
In 2021, targeted intrusion adversaries continued to adapt to the changing operational opportunities and strategic requirements of technology and world events. Russian, Chinese, Iranian and North Korean adversaries were all observed employing new tradecraft or target-scopes meant to respond to global trends. This included: Russia’s targeting of IT and cloud service providers to exploit trusted relationships; China’s weaponization of vulnerabilities at scale to facilitate initial access efforts; Iran’s use of ransomware to blend disruptive operations with authentic eCrime activity; and Democratic People's Republic of Korea’s (DPRK) shift to cryptocurrency-related entities in an effort to maintain illicit revenue generation during economic disruptions caused by the pandemic.
Introduction
In 2021, targeted intrusion adversaries continued to adapt to the changing operational opportunities and strategic requirements of technology and world events.
2022 Global Threat Report CrowdStrike 6
Governments are also adapting. This year, CrowdStrike Intelligence debuted two new adversary animals — WOLF and OCELOT — to label targeted intrusions emanating from Turkey and Colombia, respectively. The presence of these new adversaries underscores the increase in offensive capabilities outside of governments traditionally associated with cyber operations, and highlights the variety of actor end goals. Private sector offensive actors (PSOAs), such as NSO Group and Candiru, continued to serve as hackers-for-hire throughout 2021, providing governments with substitute or supplemental capabilities and further enlarging the global actor space.
In the hacktivist landscape, CrowdStrike Intelligence observed the continued development of grassroots operations and a proliferation of established hacktivist groups across the world. The rise of Belarusian group Cyber Partisans since late 2020, the expanded role and diversification of the broader Iranian hacktivist ecosystem, and the growing participation of various hacktivists in response to Western political developments all exemplify this trend.
As our adversaries adapt, so do we. CrowdStrike Intelligence offered an unparalleled level of coverage throughout 2021, adding 21 named adversaries and raising the total of tracked actors across all motivations to over 170. CrowdStrike Intelligence continues to expand coverage of threat landscapes beyond targeted intrusion, eCrime and hacktivist mission areas; in 2021, we increased support for vulnerability intelligence and mobile intelligence across all our products.
In 2021, CrowdStrike launched Falcon X Recon+ as a companion service for Falcon X Recon™. Falcon X Recon+ analysts manage monitoring, triaging, assessing and mitigating threats across the criminal underground. They also assess and recommend effective mitigation steps, helping customers act decisively and proactively to prevent and detect future attacks. CrowdStrike's Falcon X Elite service was also expanded in 2021 to provide a single point of contact for onboarding, product integration, intelligence clarification, personalized threat briefing and intelligence research. Falcon X Elite analysts continue to provide proactive notifications of threats to CrowdStrike customer organizations.
The CrowdStrike 2022 Global Threat Report summarizes the entirety of analysis performed by the CrowdStrike Intelligence team throughout 2021, including descriptions of notable themes, trends and significant events in cybersecurity. This analysis, combined with case studies from the Falcon OverWatch™ managed threat hunting team, demonstrates how threat intelligence and proactive hunting can provide a deeper understanding of the motives, objectives and activities of these actors — information that can empower swift proactive countermeasures to better defend your valuable data now and in the future.
Newly named adversaries
Increase in interactive intrusion campaigns
Increase in ransomware- related data leaks
Total adversaries tracked
21
45%
82%
170+
2022 Global Threat Report CrowdStrike 7
Adversary Nation-state or Category
BEAR RUSSIA
BUFFALO VIETNAM
CHOLLIMA DPRK (NORTH KOREA)
CRANE ROK (REPUBLIC OF KOREA)
JACKAL HACKTIVIST
KITTEN IRAN
LEOPARD PAKISTAN
LYNX GEORGIA
OCELOT COLOMBIA
PANDA PEOPLE’S REPUBLIC OF CHINA
SPIDER ECRIME
TIGER INDIA
WOLF TURKEY
Naming Conventions This report follows the naming conventions instituted by CrowdStrike to categorize adversaries according to their nation-state affiliations or motivations. The following is a guide to these adversary naming conventions.
2022 Global Threat Report CrowdStrike 8
Threat Landscape Overview eCrime Breakout Time
Adversary Tactics
1 hour 38 minutes
Today’s eCrime adversaries move with speed and purpose in pursuit of their objectives.
The CrowdStrike Falcon OverWatch team measures breakout time — the time an adversary takes to move laterally from an initially compromised host to another host within the victim environment. Our analysis of the breakout time for hands-on eCrime intrusion activity in 2021 — where such a metric could be derived — revealed an average of just 1 hour 38 minutes.
This number is essentially unchanged from what was reported by CrowdStrike’s Falcon OverWatch team in the CrowdStrike 2021 Threat Hunting Report, when breakout time for eCrime actors was measured at 1 hour 32 minutes. eCrime adversaries continue to show a high degree of sophistication as evidenced by the speed at which they can move through a victim environment, leaving a very short window for defenders to respond.
Adversaries continue to show that they have moved beyond malware.
Attackers are increasingly attempting to accomplish their objectives without writing malware to the endpoint. Rather, they have been observed using legitimate credentials and built-in tools — an approach known as “living off the land” (LOTL) — in a deliberate effort to evade detection by legacy antivirus products. Of all detections indexed by the CrowdStrike Security Cloud in the fourth quarter of 2021, 62% were malware-free.
Malware-Free Malware
38%62%
Detections indexed by the CrowdStrike Security Cloud in Q4 2021
2022 Global Threat Report CrowdStrike 9
In 2021, OverWatch tracked steadily increasing numbers of interactive intrusion campaigns. Compared to 2020, OverWatch observed a near 45% increase in the number of such campaigns, and uncovered more in the fourth quarter than in any other quarter.
eCrime Financially motivated criminal intrusion activity
Targeted State-sponsored intrusion activity that includes cyber espionage, state-nexus destruction attacks and generating currency to support a regime
Hacktivist Intrusion activity undertaken to gain momentum, visibility or publicity for a cause or ideology
Unattributed Insufficient data were available to make a confident attribution
Types of Threat Activity
Q1 2020 Q2 2020 Q3 2020 Q4 2020 Q1 2021 Q2 2021 Q3 2021 Q4 2021
Figure 1. Quarterly Growth in Interactive Intrusion Campaigns by Threat Type, Q1 2020 to Q4 2021
Interactive Intrusion Activity Over Time UnattributedTargeted HacktivisteCrime
2022 Global Threat Report CrowdStrike 10
Financially motivated eCrime activity continues to dominate the interactive intrusion attempts tracked by OverWatch. Intrusions attributed to eCrime accounted for nearly half (49%) of the observed activity, while targeted intrusions accounted for 18%, hacktivist activity was responsible for 1% and the remaining 32% of attacks remain unattributed. The distribution of these figures is similar to that of 2020.
Interactive Intrusion Campaigns by Threat Type 2020 vs. 2021
2021 2020
34%13%
1% 49%
32%18%
1% 52%
UnattributedTargetedHacktivisteCrime
2022 Global Threat Report CrowdStrike 11
2021 Themes Ransomware and the Ever-adaptable Adversary The growth and impact of BGH in 2021 was a palpable force felt across all sectors and in nearly every region of the world. Although some adversaries and ransomware ceased operations in 2021, the overall number of operating ransomware families increased. CrowdStrike Intelligence observed an 82% increase in ransomware- related data leaks in 2021, with 2,686 attacks as of Dec. 31, 2021, compared to 1,474 in 2020. These figures, coupled with other data leaks, highlight how valuable victim data is to adversaries.
3,000
2,500
2,000
1,500
1,000
500
0
2021 2020
Number of attacks
Increase in ransomware- related data leaks in 202182%
2,686
1,474
Figure 2. Number of Ransomware-related Attacks Leading to Data Leaks, 2020 vs. 2021
2022 Global Threat Report CrowdStrike 12
At times, the BGH landscape has been unpredictable, and adversaries have not always been able to immediately gauge the success or outcome of their ransomware operations. This change in landscape fluidity was observed following operations that targeted large organizations and resulted in attention and action from the highest levels of U.S. government and law enforcement, causing some adversaries to rebrand or even deactivate their tools.
The impact of government and law enforcement action on eCrime operations was also observed in the CrowdStrike eCrime Index (ECX). For example, increased media and law enforcement attention after the Colonial Pipeline and JBS Foods incidents conducted by CARBON SPIDER and PINCHY SPIDER affiliates resulted in a reduction in data leaks and access broker advertisements, which caused the ECX to dip, recover and remain volatile to date. For more detail, read this blog.
New tactics, techniques and procedures (TTPs) used in data theft attacks in 2021 aided adversaries in extorting their victims. For example, adversaries such as BITWISE SPIDER avoided using publicly available exfiltration tools by developing their own. Another major development was increased data theft and extortion without the use of ransomware, leading to the establishment of new marketplaces dedicated to advertising and selling victim data.
However, one key theme highlighted throughout 2021 is that adversaries will continue to react and move operations to new approaches or malware wherever possible, demonstrating that the ever-adaptable adversary remains the key threat within the eCrime landscape.
2021 Themes Ransomware and the Ever-adaptable Adversary
In d
u st
ri a
ls a
n d
E n
g in
e e
ri n
g
M a
n u
fa c
tu ri
n g
Te c
h n
o lo
g y
P ro
fe ss
io n
a l
S e
rv ic
e s
F in
a n
c ia
l S
e rv
ic e
s
H e
a lt
h c
a re
C o
n su
m e
r G
o o
d s
L e
g a
l
A ca
d e
m ic
L o
g is
ti c
s
2020 2021
Figure 3. Comparison of Data Leaks by Sector (Top 10), 2020 vs. 2021
500
400
300
200
100
0
13
Case Study Falcon OverWatch
2022 Global Threat Report CrowdStrike
WIZARD SPIDER Accesses Multiple Servers During Targeted BGH Operation
WIZARD SPIDER was a prolific figure on the ransomware scene in 2021. With a wealth of custom tooling at their disposal and proficiency at using native utilities to progress their intrusions, WIZARD SPIDER identified and developed a successful business model. OverWatch uncovered this threat actor in an intrusion against an organization in the engineering vertical. The TTPs observed throughout this intrusion were consistent with targeted BGH activity seen from WIZARD SPIDER in the past. The intrusion spanned four domain controllers and two valid accounts.
Defense Evasion and Discovery WIZARD SPIDER utilized RDP to authenticate into a
Windows Domain Controller via a valid domain account. The Falcon sensor raised the first of multiple detections
when malware was injected into the legitimate MSTSC process by a custom shellcode loader, ShellStarter. Falcon
OverWatch uncovered the adversary leveraging two native utilities, BITSadmin and Rundll32, to download and execute their custom tooling. OverWatch hunters quickly
zeroed in on uncovering the activity’s context, armed with CrowdStrike Falcon® sensor telemetry providing insights
into the associated process trees. A notification was then pushed to the victim organization.
Credential Access Minutes later, WIZARD SPIDER moved laterally using RDP to access a second domain controller using the same valid credentials. Here they used the built-in Ntdsutil utility to harvest credentials by copying the NTDS database.
Lateral Movement WIZARD SPIDER moved laterally to a third domain controller through a Windows administrative share and set AnchorDNS to run as a service using native tooling.
Persistence The threat actor created a scheduled task to execute ShellStarter at a later date, potentially with the intent to reinfect the victim.
Command and Control (C2) The actor pushed a rogue DLL file to another server before executing the DLL using the Microsoft signed
binary Rundll32. In this instance, the WIZARD SPIDER tool, AnchorDNS, was used to perform C2 connections over the
DNS protocol. Multiple encoded DNS requests were sent outbound to the C2 nameserver.
Persistence Acting on CrowdStrike's notifications, the victim
organization’s incident response took over at this point and began eliminating the actor within the environment. During
remediation, OverWatch identified WIZARD SPIDER returning to a fourth domain controller using a new administrator
account. OverWatch rapidly notified the victim, and the actor was once again removed from the environment.
Domain Controller
Count: 1
Domain Controller
Count: 4
Domain Controller Count: 2
Domain Controller Count: 3
2022 Global Threat Report CrowdStrike 14
Iran and the New Face of Disruptive Operations
Since late 2020, multiple Iran-nexus adversaries and activity clusters have adopted the use of ransomware as well as “lock-and-leak” disruptive information operations (IO) to target multiple organizations within the U.S., Israel and the greater Middle East and North Africa (MENA) region. Lock-and-leak operations are characterized by criminal or hacktivist fronts using ransomware to encrypt target networks and subsequently leak victim information via actor-controlled personas or entities. Since they inauthentically operate as a criminal or hacktivist entity, these types of operations conduct activity beneath a veneer of deniability. Through the use of dedicated leak sites, social media and chat platforms, these actors are able to amplify data leaks and conduct IO against target countries.
At present, CrowdStrike Intelligence is tracking several adversaries and activity clusters that are engaged in lock-and-leak operations. Based on available data, PIONEER KITTEN was the first adversary to switch from conducting likely traditional targeted intrusion operations to lock-and-leak activities in 2021. Following that, SPECTRAL KITTEN (aka BlackShadow), the ChaoticOrchestra activity cluster (aka Deus) and the SplinteredEnvoy activity cluster (aka Moses Staff) were observed primarily targeting Israeli entities with lock-and-leak operations throughout 2021 using multiple ransomware families.
In contrast to the publicity-seeking operations and lock-and-leak campaigns observed throughout 2021, disruptive activity associated with the NEMESIS KITTEN adversary lacked a distinct messaging component and largely operated discreetly. NEMESIS KITTEN conducted wide-ranging scanning and exploitation operations to establish footholds in various networks, and in select instances, conducted ransomware operations using BitLocker, a likely unique ransomware variant called SunDawn, and, in one case, a custom wiper.
The use of high-profile lock-and-leak operations, as well as the more subdued but pervasive NEMESIS KITTEN activity, provides Iran with an effective capability to disruptively target its rivals in the region and abroad. Given the success of these operations, Iran will likely continue to use disruptive ransomware into 2022.
CrowdStrike Intelligence is currently tracking several adversaries and activity clusters that are engaged in lock-and-leak operations.
2021 Themes
15
Case Study Falcon OverWatch
2022 Global Threat Report CrowdStrike
NEMESIS KITTEN Thwarted at Every Turn
In late 2021, OverWatch uncovered a hands-on intrusion against a South American technology entity. The observed TTPs, along with the use of specific tooling including the Fatedier Reverse Proxy tool, were consistent with activity previously attributed to the threat actor tracked by CrowdStrike Intelligence as NEMESIS KITTEN. The actor’s efforts were largely unsuccessful because they were blocked at every turn by the Falcon sensor.
Defense Evasion The actor was observed making numerous
attempts to disable Windows Defender, including modifying the Windows registry to disable
Windows Defender real-time monitoring and using PowerShell to create a scheduled task configured
to use the Set-MpPreference cmdlet to impair Windows Defender protections. This was the first
of multiple attempted attack techniques blocked by the Falcon sensor.
Discovery After the failed attempts to establish persistence
and C2, NEMESIS KITTEN undertook host and user reconnaissance, which included efforts to locate
Domain Controller-related information.
Credential Access Finally, the actor attempted to perform credential harvesting by modifying the registry to enable WDigest and allow for the storage of credentials in plain text. The actor then attempted to use PowerShell, along with Rundll32, to launch comsvcs.dll with minidump and extract contents of Local Security Authority Subsystem Service (LSASS). This attempt proved unsuccessful as well, thanks to the advanced capabilities of the Falcon sensor.
Persistence and C2 The actor attempted to create a scheduled task to download and execute the Fatedier Reverse Proxy tool configured to communicate with known NEMESIS KITTEN C2 infrastructure. This attempt was prevented by the Falcon sensor. In an attempt to establish persistence, the actor created a new local user account, then added the account to the Administrators and Remote Desktop Users local groups. The adversary then set the account password to never expire. Additionally, the actor unsuccessfully attempted to modify the registry to enable inbound RDP connections.
2022 Global Threat Report CrowdStrike 16
China Emerges as Leader in Vulnerability Exploitation CrowdStrike Intelligence observed China-nexus actors deploying exploits for new vulnerabilities at a significantly elevated rate in 2021, when compared to 2020.
In 2020, CrowdStrike Intelligence confirmed the exploitation by China-nexus actors — including WICKED PANDA — of two vulnerabilities published in 2020: CVE-2020-14882 (Oracle WebLogic) and CVE-2020-10189 (Zoho ManageEngine). In 2021, CrowdStrike Intelligence confirmed China-nexus actor exploitation of 12 vulnerabilities published in 2021, affecting nine different products. Ten named adversaries or activity clusters were linked to the exploitation of these vulnerabilities and a number of other incidents were identified in which activity was likely linked to unnamed Chinese actors.
Chinese actors have long developed and deployed exploits to facilitate targeted intrusion operations; however, 2021 highlighted a shift in their preferred exploitation methods. For years, Chinese actors relied on exploits that required user interaction, whether by opening malicious documents or other files attached to emails or visiting websites hosting malicious code. In contrast, exploits deployed by these actors in 2021 focused heavily on vulnerabilities in internet-facing devices or services.
2021 Themes
↗
2,686
↗1,474 Number of attacks
China-nexus actors exploited 12 published vulnerabilities
China-nexus actors exploited 2 published vulnerabilities
2020
2021
2022 Global Threat Report CrowdStrike 17
Figure 4. Timeline of Zero-day Exploits Deployed by China-nexus Actors in 2021
1 Relevant zero-day vulnerabilities exploited in connection to this activity affected Zoho ManageEngine (CVE-2021-40539, CVE-2021-44515 and CVE-2021-440077), Atlassian Confluence (CVE-2021-26084) and GitLab (CVE-2021-22205)
In 2021, Chinese actors focused significant attention on a series of vulnerabilities in Microsoft Exchange — now collectively known as ProxyLogon and ProxyShell — and used them to launch intrusions against numerous organizations worldwide. Chinese adversaries also continued to exploit internet-routing products such as VPNs and routers for both infrastructure acquisition and initial access purposes. Enterprise software products hosted on internet-facing servers were also popular targets. CrowdStrike Intelligence observed Chinese actors exploit products for initial access in a range of intrusions such as Zoho ManageEngine, Atlassian Confluence and GitLab.1
Activity from China-nexus actors in 2021 highlighted their range of exploit- acquisition capabilities. Chinese targeted intrusion actors likely independently developed a number of the observed exploits or acquired them from in-country security researchers. In particular, the Tianfu Cup hacking competition demonstrates the significant exploitation development talent within China’s hacker community. Exploits submitted at the Tianfu Cup have later been acquired by Chinese targeted intrusion actors for use in their operations. In several 2021 incidents, Chinese actors demonstrated an ability to rapidly operationalize public proof-of-concept (POC) exploit code for newly acknowledged vulnerabilities.
2021 Themes China Emerges as Leader in Vulnerability Exploitation
18
Case Study Falcon OverWatch
2022 Global Threat Report CrowdStrike
Suspected PANDA Exploits Microsoft Exchange Server Vulnerabilities Against Think Tank
Falcon OverWatch uncovered a targeted threat actor conducting a hands-on intrusion against a Europe-based think tank. The activity, which spanned multiple Windows-based hosts, began after the successful exploitation of a known Microsoft Exchange vulnerability. The adversary employed several notable TTPs in an effort to secure a persistent foothold in the victim environment. The adversary also showed a particular interest in gathering credential information, using four distinct credential dumping and harvesting techniques.
Initial Access The adversary gained initial access to the primary host
following the successful compromise of the Microsoft Exchange application pool MSExchangeOWAAppPool.
OverWatch hunters promptly discovered this malicious access after s
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.