Sept. 12, 2023, 9:10 p.m. |

GovInfoSecurity.com RSS Syndication www.govinfosecurity.com

Hackers Likely Exploited ProxyLogon to Gain Access, Says Eset
Hackers aligned with the Iranian state are targeting vulnerable Microsoft Exchange Servers to deploy a new malware backdoor that has already victimized over two dozen Israeli organizations as part of an ongoing espionage campaign. Hackers' initial access point into systems likely was ProxyLogon.

access access point backdoor ballistic bobcat campaign deploy espionage exchange exploited hackers initial access iranian iranian hackers israeli malware microsoft microsoft exchange organizations point proxylogon servers state systems targeting vulnerable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)