A recent loophole in SharePoint is currently being taken advantage of
Through initial entry, the intruder breached a Microsoft Exchange service account with domain administrator authorizations, gaining heightened access.
Through initial entry, the intruder breached a Microsoft Exchange service account with domain administrator authorizations, gaining heightened access.
The hacker then integrated Horoung Antivirus, causing a clash that deactivated safety features and reduced monitoring, enabling installation of Impacket, an array of freely available networking scripts.
Precisely, the perpetrator utilized a batch script named “hrsword install.bat” to integrate Huorong Antivirus on the framework, established a personalized service named “sysdiag”, executed the driver named “sysdiag_win10.sys”, and initiated “HRSword.exe” using a VBS script.
