Managed Service Providers MSP Compromised by Known Threat Actor
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Threat details
This activity has been linked strongly to a known threat actor whose operations have previously targeted end-victims directly, predominantly through tailored spear-phishing emails as the primary attack vector, re-crafting relevant open source content and embedding implants within attachments.
The threat actor has shown the ability to remain undetected for months, utilising a combination of tailored malware and internal system administrator toolsets, facilitated by privilege escalation enabling lateral movement across the network. They have also demonstrated a persistence in re-infecting a network post-remediation.
Managed Service Providers are particularly attractive to attackers because they often have highly privileged access to systems and data. As part of your procurement, you should have ensured that your service providers all manage their security to a level broadly equivalent to that you would expect from your internal functions.
Remediation steps
| Type | Step |
|---|---|
|
Last edited: 17 February 2020 11:34 am