Investigating Unauthorized Access | Huntress
ATT&CK techniques detected
T1525Implant Internal Image
81%
". the first major action our engineering team took was identifying and terminating any long - running vms in the qa aws environment. although this seemed like a solid step to quickly eradicate a threat actor within the network, it actually hindered parts of our later forensic ana…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
81%
"investigating unauthorized access | huntress we ’ ve investigated an incident regarding unauthorized access to our quality assurance and product testing environment. in this blog, we ’ ll share all the gory details to educate our partners — while hopefully serving as a transparen…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078.001Default Accounts
42%
"investigating unauthorized access | huntress we ’ ve investigated an incident regarding unauthorized access to our quality assurance and product testing environment. in this blog, we ’ ll share all the gory details to educate our partners — while hopefully serving as a transparen…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Learn about our investigation regarding unauthorized access to our QA and product testing environment.