May 9, 2022, 11:35 a.m. | 13Cubed

13Cubed www.youtube.com

This episode is based upon a Microsoft Detection and Response (DART) blog post (see Resources section). I, along with two of my colleagues (Johnathan Sykes and Meaghan Bradshaw), performed extensive research regarding two different methods by which it is possible to create "hidden" Scheduled Tasks. While one of the methods has been discussed before, this research shows how it might be leveraged by a Threat Actor. The second technique, as best we can tell, is novel.

*** If you enjoy …

case scheduled task task

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cyber Security Engineer

@ SNC-Lavalin | VA531: 13900 Lincoln Park Dr, Herndon 13900 Lincoln Park Drive Suite 220, Herndon, VA, 20171 USA

Information Systems Security Officer (ISSO) - early career -Tucson AZ, Onsite

@ Austin Community College | AZ855: RMS AP Bldg M05 1151 East Hermans Road Building M05, Tucson, AZ, 85756 USA