{"id":1228,"date":"2024-06-25T13:29:21","date_gmt":"2024-06-25T13:29:21","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/06\/25\/new-attack-technique-exploits-microsoft-management-console-files\/"},"modified":"2024-06-25T13:29:21","modified_gmt":"2024-06-25T13:29:21","slug":"new-attack-technique-exploits-microsoft-management-console-files","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/06\/25\/new-attack-technique-exploits-microsoft-management-console-files\/","title":{"rendered":"New Attack Technique Exploits Microsoft Management Console Files"},"content":{"rendered":"<p>\u200bThreat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses.<br \/>\nElastic Security Labs has codenamed the approach GrimResource after identifying an artifact (&#8220;sccm-updater.msc&#8221;) that was uploaded to the VirusTotal malware\u00a0Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses.<br \/>\nElastic Security Labs has codenamed the approach GrimResource after identifying an artifact (&#8220;sccm-updater.msc&#8221;) that was uploaded to the VirusTotal malware\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThreat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses. Elastic Security Labs has codenamed the approach GrimResource after identifying an artifact (&#8220;sccm-updater.msc&#8221;) that was uploaded to the VirusTotal malware\u00a0Threat actors&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/06\/25\/new-attack-technique-exploits-microsoft-management-console-files\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">New Attack Technique Exploits Microsoft Management Console Files<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":1229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1228"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=1228"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1228\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/1229"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=1228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=1228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=1228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}