
A fight to defend Taiwan financial institutions. [Research Saturday]
CyberWire Daily
00:00
Is This an Intent Hunting Strategy?
"This really points out the utility of active threat hunting," says D. "We did observe antlying and abusing an m s sequel service to execute system commands." The command they actually executed was to delode their malware, which indicates that they most likely infection vector was expoitation of some web application or some service. They would then would protect these archives and then use combinations of paris shell and i transfer models to upload the data to attacker control structure.
Play episode from 07:46
Transcript


