When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Unmanaged IT

The group made its way into the companys infrastructure through three unmanaged AIX servers.

That allowed threat actors to brute-force their way in, after which they established persistence and lurked for months.

An illustration of a 1960s spy with sunglasses and a big coat

The researchers believe the intrusion originally occurred in March this year.

The groups goal was to harvest information, which could later probably be used in supply chain attacks.

Since the organization makes gear for critical sectors, the risk of important hardware going bust was real.

The victim company hadendpoint detection and response(EDR) systems set up.

ViaThe Register

More from TechRadar Pro