Associate
- Joined
- 19 Nov 2021
- Posts
- 1,088
- Location
- Portsmouth
Looks like their entire infrastructure was owned via a social engineering attack, which allowed the actor to access their VPN. From there he found a network share with some powershell scripts - one of which had admin credentials for their password management system.
He got domain admin, google cloud admin, AWS admin, slack admin, HackerOne admin plus a whole bunch of other stuff.
From the PoV of someone in IT, this is terrifying to contemplate!
He got domain admin, google cloud admin, AWS admin, slack admin, HackerOne admin plus a whole bunch of other stuff.
From the PoV of someone in IT, this is terrifying to contemplate!