20 Apr, 2021

APT29 Attack Methods Most Used by Threat Actors 

National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI),  SVR'  (Russia's Foreign Intelligence Service) announced that the APT29 hacker group, which is thought to be supporting, frequently exploits five known vulnerabilities.

APT29 known as cyber threat actors named Cozy Bear and The DukesThe vulnerabilities exploited by the hacker group are listed in the CVE data base .
CAND lists here is: 

 

Techniques used by attackers; 

  • Use publicly available vulnerabilities: Enemies can cause unwanted or unexpected behavior connected from a weakness in a computer or program try to leveragefolds.
  • Use external remote servicess: Cyber ​​threat actors outsource to initially access and/or stay within a networkconnected can use remote services. Remote services such as VPNs, Citrix, and other access mechanisms (especially RDP) allow users to access external locations. allows it to connect to internal corporate network resources.
  • Users may manipulate products or product delivery mechanisms before they are received by the final consumer for data or system consensus purposes. 
  • Default using accounts: Competitors can obtain and misuse the credentials of existing accounts as a way to gain access or elevate permissions. 
  • Cyber ​​threat actors can exploit software vulnerabilities to collect credentials.
  • Fake web credentials: Attackerto a valid SAML token-signing certificate

The NSA, CISA and FBI are encouraging them to check their networks for Indicators of Compromise (IOCs) on five vulnerabilities.  

Source:
nsa.gov


[vc_row][vc_column][vc_cta h2=”” add_button=”bottom” btn_title=”Teklif Talep Edin” btn_style=”flat” btn_shape=”square” btn_color=”danger” css_animation=”fadeInLeft” btn_link=”url:https%3A%2F%2Fcyberartspro.com%2Fteklif-isteme-formu%2F||target:%20_blank|”]Siber Güvenlik, Dijital Dönüşüm, MSSP, Sızma Testi, KVKK, GDPR, ISO 27001, ISO 27701 ve DDO Bilgi ve İletişim Güvenliği Rehberi başlıklarıyla ilgili teklif almak için lütfen tıklayın.[/vc_cta][/vc_column][/vc_row]

About Content:
Share on Social Media:
Facebook
Twitter
LinkedIn
Telegram

Related Articles