TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

German publisher/group Heise was infected by Emotet

4 pointsby bjokoalmost 6 years ago

1 comment

bjokoalmost 6 years ago
Here is short summary taken from the linked Reddit post:<p>* root cause was a piggy-backed mail conversation where a legitimate mail correspondence&#x2F;dialogue was continued by a hacker who sent over a macrofied .doc; the recipient opened it because it looked legitimate and would you please &quot;Enable Editing&quot;<p>* that system infected&#x2F;contacted various other systems in the network; those systems were cleaned superficially<p>* two days later the firewall noticed outgoing traffic, so the infections were still ongoing<p>* suspicious activity was discovered on the domain controllers<p>* IT decided to shut down the internet connectivity<p>* the whole domain is going to be rebuilt<p>* although there was a policy in place to limit local admins, some systems&#x2F;accounts were NOT locked down, for example some POS &quot;presenter&quot; software that needed local admin<p>* as to why the domain controllers were compromised: it is possible that the admins logged into infected systems with a domain admin to clean those systems<p>This whole thing really is special, because there are the usual stereotypes in play:<p>* macros weren&#x27;t disabled company-wide or at least restricted<p>* local admins are a thing<p>* software that NEEDs local admin is still a thing<p>* admins might (!) have used domain admin credentials to enter suspicous systems<p>...and it happened to Heise, of all places.