"##erabilities in on - premises microsoft exchange servers. these vulnerabilities, cve - 2021 - 26855, cve - 2021 - 26857, cve - 2021 - 26858, and cve - 2021 - 27065, affected exchange server 2013, 2016, and 2019 and created a perfect storm of security weaknesses that attackers ch…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
95%
"americans. this breach has turned into a textbook example of how a single unpatched vulnerability can disrupt livelihoods, careers, and corporate reputations. it all began with cve - 2017 - 5638, a critical vulnerability in apache struts 2, a popular web application framework. wh…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
94%
"non - negotiable - investment in strong ir plans to control chaos in the aftermath of a hard - hitting cyberattack - criticality of early detection and response for minimizing cyberattacks at scale when chaos erupted across the threat landscape, our security experts at huntress q…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
93%
"the attack was attributed to darkside, a ransomware - as - a - service ( raas ) operation, which used a single compromised vpn password for an account that wasn ’ t in use at the time of the attack and that didn ’ t have multi - factor authentication ( mfa ) enabled. darkside ran…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
92%
"the cl0p ransomware gang exploited a zero - day sql injection vulnerability ( cve - 2023 - 34362 ) in progress software ’ s moveit managed file transfer ( mft ) software, a tool for exchanging sensitive data. this triggered a cascade of breaches across hundreds of organizations w…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
88%
"you can ' t see. it pushed organizations to modernize their approach to third - party software security by : - focusing on software bill of materials ( sbom ) and tracking detailed inventories of every component in software supply chains - looking at every library, component, and…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1584.005Botnet
82%
"the qakbot botnet empire finally crumbled in august 2023, thanks to an international coalition of law enforcement agencies. operation duck hunt redirected qakbot botnet traffic through law enforcement servers and sent uninstall files to machines infected with qakbot. so what exac…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
82%
"to : - run security assessments for suppliers, scrutinize their security practices, and set clear incident response ( ir ) guidelines for the supply chain companies you work with - segment networks like crazy. limit the vendor software ’ s access to critical systems and data - us…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
74%
"assets because they ' re less likely to be monitored and patched consistently. 3. solarwinds supply chain attack ( december 2020 ) we all know that software updates make us safer. they patch vulnerabilities, add features, and keep our systems running smoothly. but what happens wh…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
66%
"##ct, a widely used remote monitoring and management ( rmm ) tool, was the latest company to warn of two critical vulnerabilities. what unfolded was an alarming, stereotypical example of how quickly threat actors can exploit security flaws, turning thousands of trusted software b…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
60%
"##nect automatically operates with elevated privileges across networks, making it a perfect launchpad for attackers to move laterally and compromise endpoints. victims were suddenly dealing with : - ransomware deployments that encrypted critical business data - cryptocurrency min…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
57%
"assets because they ' re less likely to be monitored and patched consistently. 3. solarwinds supply chain attack ( december 2020 ) we all know that software updates make us safer. they patch vulnerabilities, add features, and keep our systems running smoothly. but what happens wh…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
53%
"the attack was attributed to darkside, a ransomware - as - a - service ( raas ) operation, which used a single compromised vpn password for an account that wasn ’ t in use at the time of the attack and that didn ’ t have multi - factor authentication ( mfa ) enabled. darkside ran…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
49%
"to : - run security assessments for suppliers, scrutinize their security practices, and set clear incident response ( ir ) guidelines for the supply chain companies you work with - segment networks like crazy. limit the vendor software ’ s access to critical systems and data - us…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
45%
"in around $ 10 billion in losses. the notpetya attack marked a significant turning point in cybersecurity, redefining how the world understood nation - state cyber warfare and supply chain vulnerabilities : - nation - state actors are willing to cause massive collateral damage to…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
38%
"assets because they ' re less likely to be monitored and patched consistently. 3. solarwinds supply chain attack ( december 2020 ) we all know that software updates make us safer. they patch vulnerabilities, add features, and keep our systems running smoothly. but what happens wh…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
38%
"americans. this breach has turned into a textbook example of how a single unpatched vulnerability can disrupt livelihoods, careers, and corporate reputations. it all began with cve - 2017 - 5638, a critical vulnerability in apache struts 2, a popular web application framework. wh…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1587.004Exploits
32%
"trip down memory lane starts on june 27, 2017. it began like any other tuesday for businesses around the world. but by the end of the day, global supply chains were paralyzed, hospitals were forced offline, and shipping giant maersk was operating with pen and paper across 76 port…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1583.005Botnet
30%
"the qakbot botnet empire finally crumbled in august 2023, thanks to an international coalition of law enforcement agencies. operation duck hunt redirected qakbot botnet traffic through law enforcement servers and sent uninstall files to machines infected with qakbot. so what exac…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Celebrate 10 years of wrecking hackers! See how Huntress has evolved and elevated in an ever-changing cybersecurity landscape, shaped by key milestones and critical lessons.