▲ | fckgw 3 days ago | ||||||||||||||||||||||||||||||||||
> The standout red flag was that the unique machine name used by the individual was the same as one that we had tracked in several incidents prior to them installing the agent. The machine was already known to the company as belonging to a threat actor from previous activity | |||||||||||||||||||||||||||||||||||
▲ | glitchc 2 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
Yes, but only according to the company's own logs, which were not externally validated. To rephrase, the company thinks this was an active attacker based on logs its own tool generates. It does not discount the possibility that the tool generated erroneous logs or identified the wrong machine(s). | |||||||||||||||||||||||||||||||||||
▲ | bornfreddy 3 days ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
That's not very convincing. They still abused trust placed in them - by an active attacker, granted, but still... This seems like a legally risky move and it doesn't inspire trust in Huntress. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
▲ | viccis 3 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
That is what I said, yes. |