CERT-UA Uncovers Gamaredon’s Rapid Data Exfiltration Tactics Following Initial Compromise
,
The Russia-linked threat actor known as Gamaredon has been observed conducting data exfiltration activities within an hour of the initial compromise.
« As a vector of primary compromise, for the most part, emails and messages in messengers (Telegram, WhatsApp, Signal) are used, in most cases, using previously compromised accounts, » the Computer Emergency Response Team of Ukraine (CERT-UA) said in
« As a vector of primary compromise, for the most part, emails and messages in messengers (Telegram, WhatsApp, Signal) are used, in most cases, using previously compromised accounts, » the Computer Emergency Response Team of Ukraine (CERT-UA) said in
,
The Russia-linked threat actor known as Gamaredon has been observed conducting data exfiltration activities within an hour of the initial compromise.
« As a vector of primary compromise, for the most part, emails and messages in messengers (Telegram, WhatsApp, Signal) are used, in most cases, using previously compromised accounts, » the Computer Emergency Response Team of Ukraine (CERT-UA) said in
« As a vector of primary compromise, for the most part, emails and messages in messengers (Telegram, WhatsApp, Signal) are used, in most cases, using previously compromised accounts, » the Computer Emergency Response Team of Ukraine (CERT-UA) said in
, ,
https://thehackernews.com/2023/07/cert-ua-uncovers-gamaredons-rapid-data.html