Russian hackers exploit CVE-2018-0171, use custom tools for persistence

View profile for Charles Kao

Entrepreneur | Security Executive | Speaker | Mentor | Investor

Adams explained that the Russian threat actors employ a multi-faceted approach: First, they exploit the unpatched CVE-2018-0171 vulnerability. Following a successful breach, they conduct network reconnaissance, focusing on industrial control system protocols. They also utilize sophisticated post-exploitation tools, such as custom SNMP tooling for persistence and the SYNful Knock firmware implant, to maintain covert access and evade detection for extended periods. https://lnkd.in/dRePswfM

To view or add a comment, sign in

Explore content categories