“government, scientific entities hit via daemon tools supply chain attack government, scientific, manufacturing, and retail organizations have been targeted with a sophisticated backdoor in an ongoing supply chain attack involving the daemon tools disk imaging software, kaspersky …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.001Compromise Software Dependencies and Development Tools
86%
“a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. however, their intent – whether it is cyberespionage or ‘ big game hunting ’ – is currently unclear, ” kaspersky notes. related : 1, 800 hit in mi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
82%
“a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. however, their intent – whether it is cyberespionage or ‘ big game hunting ’ – is currently unclear, ” kaspersky notes. related : 1, 800 hit in mi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195.002Compromise Software Supply Chain
58%
“a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. however, their intent – whether it is cyberespionage or ‘ big game hunting ’ – is currently unclear, ” kaspersky notes. related : 1, 800 hit in mi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1072Software Deployment Tools
42%
“government, scientific entities hit via daemon tools supply chain attack government, scientific, manufacturing, and retail organizations have been targeted with a sophisticated backdoor in an ongoing supply chain attack involving the daemon tools disk imaging software, kaspersky …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1592.002Software
30%
“a small subset of infected machines clearly indicates that the attacker had intentions to conduct the infection in a targeted manner. however, their intent – whether it is cyberespionage or ‘ big game hunting ’ – is currently unclear, ” kaspersky notes. related : 1, 800 hit in mi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
While trojanized Daemon Tools versions were installed worldwide, a sophisticated backdoor was dropped only on a dozen systems.