SentinelLabs · @SentinelLabs
146 followers · 8 posts · Server infosec.exchange

ICYMI From Earlier in the Week:

Targeted Attacks Leverage Signed Malicious Microsoft Drivers

s1.ai/signed-ms

Summary:
:purple_circle:​ SentinelOne has observed prominent threat actors abusing legitimately signed Microsoft drivers in active intrusions into telecommunication, BPO, MSSP, and financial services businesses.
:purple_circle:​ Investigations into these intrusions led to the discovery of and malware, part of a small toolkit designed to terminate AV and EDR processes.
:purple_circle:​ We first reported our discovery to Microsoft’s Security Response Center (MSRC) in October 2022 and received an official case number (75361). On Tuesday, MSRC released an associated advisory under ADV220005. (msrc.microsoft.com/update-guid)
:purple_circle:​ This research was released alongside Mandiant. Readers can find their blog here: mandiant.com/resources/blog/hu

#poortry #stonestop

Last updated 2 years ago

jreisdorffer · @jreisdorffer
50 followers · 4 posts · Server infosec.exchange
jreisdorffer · @jreisdorffer
50 followers · 4 posts · Server infosec.exchange
jreisdorffer · @jreisdorffer
50 followers · 4 posts · Server infosec.exchange

Collaborative research done by DFIR, , S1 Research & Development and our friends at @Mandiant: sentinelone.com/labs/driving-t…

#vigilance #sentinellabs #poortry #stonestop

Last updated 2 years ago