A recent attack involving threat actors attempting to attack Ukrainian government infrastructure happened in one of our deception environments last week. These actors exploited the CVE-2021-4034 vulnerability in an attempt to run commands as privileged users.
Due to the continued interest in this attack and the fascinating information it reveals, our team of experts will come together for a webinar to go over the recovered intel and the significance of it.
Technical Evidence of Attacks on Ukrainian Government Infrastructure
Uncovering Threat Actor Techniques
Date: On-Demand
Sign up here:
https://us02web.zoom.us/webinar/register/WN_tGvkGh64RSq1Yk4KM2_t3g#/
In this webinar, we will discuss an in-depth analysis of this attack with our team of experts. Join Nicole Carignan, CounterCraft Customer Success Manager, and David Barroso, CEO, as they discuss the attack, go into detail on the TTPs, and talk about the possible implications going forward for the financial sector and critical infrastructure.
What’s Included
Attendees of the webinar will also receive:
- – The current intel from the attack
- – A download of the observables and scripts associated with the incident
- – Updates in your inbox on further intel from this continuing deception campaign
Find out more about the attack at our previous blogpost.