Sept. 12, 2023, 10:17 p.m. |

BankInfoSecurity.com RSS Syndication www.bankinfosecurity.com

Hackers Likely Exploited ProxyLogon to Gain Access, Says Eset
Hackers aligned with the Iranian state are targeting vulnerable Microsoft Exchange Servers to deploy a new malware backdoor that has already victimized over two dozen Israeli organizations as part of an ongoing espionage campaign. Hackers' initial access point into systems likely was ProxyLogon.

access access point backdoor ballistic bobcat campaign deploy espionage exchange exploited hackers initial access iranian iranian hackers israeli malware microsoft microsoft exchange organizations point proxylogon servers state systems targeting vulnerable

Principal - Cyber Risk and Assurance - Infra/Network

@ GSK | Bengaluru Luxor North Tower

Staff Security Engineer

@ Airwallex | AU - Melbourne

Chief Information Security Officer

@ Australian Payments Plus | Sydney, New South Wales, Australia

TW Test Automation Engineer (Access Control & Intrusion Systems)

@ Bosch Group | Taipei, Taiwan

Consultant infrastructure sécurité H/F

@ Hifield | Sèvres, France

SOC Analyst

@ Wix | Tel Aviv, Israel