![]() It has “highly sophisticated Red Teams to challenge your company’s most critical assets.” The website also mentioned the company can perform “an enhanced due diligence and risk analysis process through providing a deep understanding of individuals and entities”. The company has “a set of highly sophisticated techniques in gathering and analyzing information.” The company was not involved in any targeting or running of the operation, indicated Microsoft.Īn archived copy of the DSIRF website states the company provides services “to multinational corporations in the technology, retail, energy, and financial sectors”. It is likely that DSIRF was offering its spyware as access-as-a-service and hack-for-hire. Microsoft tagged the security vulnerability with a CVE ID CVE-2022-22047 and has confirmed that it has been patched.Ĭompanies that develop and deploy malware on a commercial basis are referred to as Private-Sector Offensive Actors (PSOA), and Microsoft also labels them as “ cyber mercenaries”. ![]() The DSIRF could compromise systems utilizing a previously unknown zero-day privilege escalation exploit for Windows and an Adobe Reader remote code execution attack. ![]() Subzero itself is a rootkit that granted full control over a compromised system. Combined with a 0-zero-day Windows vulnerability, the attack gained enhanced usage rights on the target machine. ![]() The attack was seeded via a weaponized PDF document sent via email.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |