MuddyWater, an Iranian threat actor, exploits Log4j two vulnerabilities in SysAid applications to target Israeli organizations. As soon as the attacker gains access to the targeted organization, it establishes persistence, dumps credentials, and moves laterally within the organization using both custom and well-known hacking tools and operating system tools.
Get through updates and upcoming events, and more directly in your inbox