When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Unmanaged IT
The group made its way into the companys infrastructure through three unmanaged AIX servers.
That allowed threat actors to brute-force their way in, after which they established persistence and lurked for months.
The researchers believe the intrusion originally occurred in March this year.
The groups goal was to harvest information, which could later probably be used in supply chain attacks.
Since the organization makes gear for critical sectors, the risk of important hardware going bust was real.
The victim company hadendpoint detection and response(EDR) systems set up.
ViaThe Register