Providing security to customers is a complex and resource-intensive endeavor in a complex world of deeply integrated technologies. As part of our commitment to keeping customers safe, we often complement our security stack offerings with managed detection and response, threat hunting and constant monitoring of customer infrastructure. The Cyber-Threat Intelligence Lab keeps a close eye on alerts and EDR reports coming from infrastructure, helping owners and maintainers navigate the early stages of compromise.
This is the case of an incident we worked on with a technology partner in the United States of America.
We identified a complex kill chain and monitored the attack through various stages to assess the extent of the breach and help the customer regain control of the network. We are releasing this research paper to help other decision-makers cover their blind spots and improve their overall security posture.
Attack at a Glance
An up-to-date and complete list of indicators of compromise is available to Bitdefender Advanced Threat Intelligence users. The currently known indicators of compromise can be found in the whitepaper below.
tags
I'm a veteran security researcher with more than a decade of experience. His research is mostly focused on exploits, advanced persistent threats, cybercrime investigations, and packing technologies.
View all postsVictor VRABIE is a security researcher at Bitdefender Iasi, Romania. Focusing on malware research, advanced persistent threats and cybercrime investigations, he's also a graduate of Computer Sciences.
View all postsJune 08, 2023
May 02, 2023
January 11, 2023
January 05, 2023