10 ready-to-implement PowerShell scripts to make AD management easy!

Recent AD News

Microsoft offers free tool to detect signs of SolarWinds malware code

Microsoft is helping organizations that are investigating whether they are victims of the Solorigate attack by offering them a free tool, the CodeQL queries that the company used to scan its source code for after the attack. the queries Microsoft used with CodeQL identify any code that is similar in pattern and function to the SolarWinds malware. So, these queries can be used on any software to do the same.

Meanwhile, security researchers from SecurityScorecard say that they have found a piece of malware used in the attack that dates back to almost four years ago. The malware, dubbed Teardrop, profiles a victim’s system and network, and this dates back all the way to 2017.

Ryan Sherstobitoff, vice president of cyberthreat research and intelligence at SecurityScorecard derived from this fact that Teardrop was likely used in other APT operations before SolarWinds by this nation-state hacking team.

Notably, when FireEye went public about suffering the data breach in December 2020, the company described Teardrop as a piece of malware that they have not seen before.

Related posts
Recent AD News

Chinese hacker group 'Naikon' strikes again: Targets ASEAN nations

Recent AD News

Bumblebee: A new malware loader on the prowl

Recent AD News

FBI issues alert: A lethal ransomware that breached 60 companies

Recent AD News

Israel's Pegasus spyware finds a new target

×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.