all InfoSec news
Understanding and Detecting Lateral Movement
Malware Analysis, News and Indicators - Latest topics malware.news
A threat actor, hoping to launch a ransomware attack on an organization, is able to use stolen credentials to get into a user’s email account. Utilizing spear phishing techniques and reconnaissance, the threat actor emails the IT department, asking for credentials to an important network application. They gain the credentials, move deeper into the network, … Understanding and Detecting Lateral Movement
Article Link: Understanding and Detecting Lateral Movement | Arctic Wolf
1 post - 1 participant
account actor application asking attack credentials department email emails important lateral movement launch network organization phishing phishing techniques ransomware ransomware attack reconnaissance spear phishing stolen stolen credentials techniques threat threat actor understanding