On May 7th a joint advisory put together by the NCSC, CISA, FBI, and the NSA warned that the Russian SVR has once again switched their tactics in an effort to avoid detection. This comes on the heels of a separate advisory released on April 26th, warning of the attacks that were being committed by the Russian SVR against different foreign and US organizations. The group has begun using the open-source tool Sliver and have also started to search for Microsoft Exchange servers that are vulnerable to CVE-2021-26855. Included in a list below are the most common bugs that have been taken advantage of by the Russian SVR—these are not all of the tactics they used, just the most commonly observed vulnerabilities they exploited if systems were not patched:
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security