In one case, Silk storm used API keys to reach the devices from low-party customers and employers through the Director’s account. Using the shared API keys, attackers reset the default planning account, form additional users, Web shells sent, removal of log entries to hide their tracks.
Located victims are primarily from the government’s government and local government, and IT government, and the information stolen in their programs was related to government government policy and management, legal investigations and other legal proceedings and other legal investigations.
“The storm Silk has shown professionals in understanding how clouds are shipped and allowed them to be successfully accompanied by later,” said the Exfilterate report immediately within victims of victims, “said the investigators.
Source link