- It has proven that the threat actors who hacked SolarWinds are highly skilled! According to a recent analysis by Picus Labs, they use 20+ attack techniques, most of them are for defense evasion. And, the attack campaign has the potential to affect thousands of public and private organizations. https://www.picussecurity.com/resource/blog/ttps-used-in-the-solarwinds-breach 3 comments technology
Linked pages
- Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor | Mandiant https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html 229 comments
- GitHub - mandiant/sunburst_countermeasures https://github.com/fireeye/sunburst_countermeasures 0 comments
Related searches:
Search whole site: site:www.picussecurity.com
Search title: Tactics, Techniques, and Procedures (TTPs) Used in the SolarWinds Breach
See how to search.