Some of these tactics included using DNS based command-and-control (C2) that mimicked Amazon AWS DNS traffic, blending in with SolarWind’s legitimate source code and handpicking only a small number of targets. This 13 minute talk covers tactics and techniques that the SolarWinds hackers used My lightning talk from the SEC-T 0x0D conference has now been How the SolarWinds Hack (almost) went Undetected
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |