Register now for better personalized quote!

WastedLocker Goes

Jul, 06, 2020 Hi-network.com

By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec.

Threat summary

  • After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral movement prior to activating ransomware and demanding ransom payment.
  • The use of

tag-icon Hot Tags :

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.