A Bird’s-eye view: ShareFinder-How Threat Actors Discover File Shares (The DFIR Report)

This is the second post in an ongoing series that examines documented/public breaches with a special focus on Canary and Canarytoken deployment. The posts do not intend to imply that we would have been a silver bullet and prevented the breach; rather, our approach has been to help detect breaches. These posts are primarily intended to give our customers and users ideas for possible deployment options. In this 2nd blog post, we’ll look at: Why do attackers like file shares?

Continue Reading

Site Footer

Authored with 💚 by Thinkst