Investigating a Stealthy Intrusion Through Third-Party Compromise
Source: Socprime
Published:
<p>The report examines a stealthy intrusion in which threat actors compromised a third-party IT services provider and then abused the legitimate HPE Operations Agent to deploy web shells, credential-stealing DLLs, and tunneling utilities. By relying on trusted management software instead of loud exp