An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities to load malware, establish communication, and persistence in preparation for ransomware attacks.
In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. However, researchers say that the same method works with other EDR products, as well.
reliaquest.com
In one attack analyzed by researchers at cybersecurity company ReliaQuest, Storm-0249 leveraged the SentinelOne EDR components to hide malicious activity. However, researchers say that the same method works with other EDR products, as well.
Threat Spotlight: Storm-0249 Moves from Mass Phishing to Precision EDR Exploitation
Storm-0249 evolves to abuse SentinelOne's SentinelAgentWorker.exe, bypassing defenses. Discover how automated incident response and behavioral analytics detect advanced threats.