Coming soon - Get a detailed view of why an account is flagged as spam!
view details

This post has been de-listed

It is no longer included in search results and normal feeds (front page, hot posts, subreddit posts, etc). It remains visible only via the author's post history.

7
Tools Used in Response to the MGM Incident
Post Flair (click to view more posts with a particular flair)
Post Body

Not much on the mitigation side has been mentioned from the attacker or any of the reporting. So funny that none of the companies used to defend the network have been named except Okta who was a big part of allowing them to have persistence. They did mention ESXi so I'm wondering if it was the Carbon Black stuff or other? The endpoint software was fooled by the old code-signing certificates (and to be fair this would get 99% of EDR and Antivir endpoint agents), but AlphaV's blog on their darknet site did mention that they knew they were exposed at various points in the breach that led up to the ransomware getting deployed. I'd love to know what exposed some of their TTPs and to at least get a better idea of where their playbooks were weak (also mentioned by the attacker). Anyone with information on their SIEM, EDR, Firewalls, other controls? Any idea which logs they found? (likely AAD or Okta I'm sure but I wanted to confirm).

Author
Account Strength
90%
Account Age
8 years
Verified Email
Yes
Verified Flair
No
Total Karma
2,131
Link Karma
178
Comment Karma
337
Profile updated: 5 days ago
Posts updated: 3 months ago

Subreddit

Post Details

We try to extract some basic information from the post title. This is not always successful or accurate, please use your best judgement and compare these values to the post title and body for confirmation.
Posted
1 year ago