CyberWire Daily cover image

A fight to defend Taiwan financial institutions. [Research Saturday]

CyberWire Daily

00:00

Is This an Intent Hunting Strategy?

"This really points out the utility of active threat hunting," says D. "We did observe antlying and abusing an m s sequel service to execute system commands." The command they actually executed was to delode their malware, which indicates that they most likely infection vector was expoitation of some web application or some service. They would then would protect these archives and then use combinations of paris shell and i transfer models to upload the data to attacker control structure.

Play episode from 07:46
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app