by EW in
Domain controller Recent News

.

It is like having a security guard at the door of your house to protect it from intruders; having an EDR in place is like having a security guard to protect your computer from BYOVD attacks.

– AuKill malware was used to disable SentinelOne on a print server by exploiting a vulnerable driver.
– The attacker misidentified the asset as a Domain Controller (DC).
– To gain local administrator credentials, the attacker successfully brute-forced an account.
– PCHunter was used to survey the client’s network before deploying the EDR killer.
– Shadow volume copies were deleted, revealing the attackers’ intentions.
– The attackers bypassed security measures by exploiting the insecure PROCEXP.SYS driver.
– We recommend blacklisting outdated drivers with a known history of exploitation and maintaining an inventory of drivers installed on systems.
– We also advise bolstering the security of administrator accounts to defend against brute force attacks.

Source: https://cybersecurity.att.com/blogs/security-essentials/stories-from-the-soc-silent-sabotage-unveiling-the-stealthy-tactics-of-aukill-malware

Share Post:

Related Posts

No Comments

Leave a Reply