Common Tools & Techniques Used By Threat Actors and Malware — Part I

<p>If you&rsquo;ve been keeping up with the information security world even for a little bit, you&rsquo;ve certainly heard of the recent supply chain attack that occurred in the Solar Wind Orion product. A truly sophisticated attack that showed what a determined group with a lot of patience and skills can do.</p> <p>A lot of research has been done on the techniques and tactics used by the &ldquo;SUNBURST&rdquo; backdoor and a lot of blog posts have been published describing it in extreme details.</p> <p>But one of the recent blog posts by CrowdStrike dubbed&nbsp;<strong>&ldquo;SUNSPOT: An Implant in the Build Process&rdquo;,&nbsp;</strong>That details how the threat actors were able to inject the &ldquo;SUNBURST&rdquo; backdoor into the source code of the SolarWinds Orion IT management product.</p> <p><a href="https://infosecwriteups.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879"><strong>Website</strong></a></p>
Tags: Common tools