Slide 2
Slide 2 text
© Mandiant, A FireEye Company. All rights reserved.
Background Case Study
2
Attacker
Client
Victim
VPN
WinRM,
SMB,
NetBIOS
Victim workstations,
servers
Fortune 100 organization
Compromised for > 3 years
Active Directory
Authenticated access to
corporate VPN
Command-and-control via
Scheduled tasks
Local execution of
PowerShell scripts
PowerShell Remoting