The adversaries gained initial network access through compromised credentials, then exploited default MFA settings to enroll a new device and “PrintNightmare” vulnerability to move laterally into cloud & email accounts, & exfiltrate documents.
-
-
Show this thread
-
This exploit is an example of why organizations need to be extra vigilant & adopt a heightened cybersecurity posture that includes enforcing MFA and reviewing configuration to protect against “fail open” and re-enrollment scenarios.
Show this thread -
We also encourage individuals to take a layered approach to cybersecurity - MFA and mitigating known exploited vulnerabilities are steps that organizations should take to help keep information safe. Go Shields Up: http://cisa.gov/shields-up pic.twitter.com/4HJOtuW38c
Show this thread
End of conversation
New conversation -
-
-
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
coucou
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
Show additional replies, including those that may contain offensive content
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.