In-Depth Analysis of Malicious PowerShell Exploit Leveraging Embedded DCOM for Persistent Access
Alex Morgan — Threat Intelligence Analyst Key TakeawaysMalicious PowerShell scripts were used to exploit DCOM vulnerabilities for lateral movement.Persistence was achieved through registry modifications and scheduled tasks.Indicators of compromise including specific command-line parameters were identified…