Nov. 29, 2023, 1:30 a.m. | /u/epheria_the_owl

cybersecurity www.reddit.com

Looking to share intel and experiences as I believe my organization has been a tangential target with the Ardent attacks. Here's some of the more relevant bigger things I've seen in this case:

* compromised account attacking a server
* same account runs a "install.dll" via regsvr32
* tons of automation enumeration follows, saving some results to disk
* Attacker used xenarmor to output a few files that appeared to contain passwords/hashes
* files deleted
* anomalous connections

Next day …

account ardent attacks case compromised cybersecurity dll experiences install intel organization ransomware ransomware attacks regsvr32 relevant server share target things week

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Application Security Engineer, Application Security

@ Miro | Amsterdam, NL

SOC Analyst (m/w/d)

@ LANXESS | Leverkusen, NW, DE, 51373

Lead Security Solutions Engineer (Remote, North America)

@ Dynatrace | Waltham, MA, United States