Common Tools & Techniques Used By Threat Actors and Malware — Part I
<p>If you’ve been keeping up with the information security world even for a little bit, you’ve certainly heard of the recent supply chain attack that occurred in the Solar Wind Orion product. A truly sophisticated attack that showed what a determined group with a lot of patience and skills can do.</p>
<p>A lot of research has been done on the techniques and tactics used by the “SUNBURST” backdoor and a lot of blog posts have been published describing it in extreme details.</p>
<p>But one of the recent blog posts by CrowdStrike dubbed <strong>“SUNSPOT: An Implant in the Build Process”, </strong>That details how the threat actors were able to inject the “SUNBURST” backdoor into the source code of the SolarWinds Orion IT management product.</p>
<p><a href="https://infosecwriteups.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879"><strong>Website</strong></a></p>