We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

Gravité Blog

Gravité has been serving the Victoria area since 2006, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Looking at FoggyWeb to Better Understand Malware Attacks

Looking at FoggyWeb to Better Understand Malware Attacks

The cyberattack on SolarWinds was devastating for many reasons, and Microsoft has officially uncovered yet another type of malware used in the attack on the software provider. This time, it is a backdoor threat they have named FoggyWeb. What does this threat do and why is it so important to look at this incident even now?

Back in April, security researchers laid the blame for the SolarWinds attack on the Russian Foreign Intelligence Service. Microsoft has discovered that there are various modules used by the attack group, a collective referred to as Nobelium. Nobelium includes other malware such as GoldMax, GoldFinder, and Sibot. Other types of malware that were previously known to researchers include Sunburst/Solorigate, Teardrop, and Sunspot. In the case of FoggyWeb, it is a malware which installs a backdoor on an already compromised server.

Backdoors themselves allow hackers to pull off all sorts of nasty tricks. Hackers can use the backdoor to access a network at any given time in the future, and they can use the backdoor to install malware, access sensitive data, spy on users, and so much more. It’s safe to say that backdoors are dangerous for businesses to contend with.

As for FoggyWeb, the backdoor itself is used to steal credentials and configurations from compromised servers. With these credentials in hand, hackers can remain on the infrastructure even after they have been purged from it. Hackers can also use these credentials to control access to important assets or other tasks that demand authentication. As with other backdoor threats, FoggyWeb can also receive commands remotely to pull off even more dangerous stunts.

To ensure that your business does not fall victim to these types of threats, you should take a multi-faceted approach to your network security. This includes monitoring your network for suspicious activity, ensuring that user access controls are in effect, and deploying comprehensive security solutions that can keep your infrastructure safe.

Thankfully, these solutions are more accessible than ever with the help of managed service providers like Gravité. We can help arm you with the tools to protect your business from any type of threat. To keep your business secure from all sorts of threats, reach out to Gravité at 1300 008 123.

Is the VPN My Office Uses a Public VPN?
3 Reasons to Consider a Private Cloud Solution
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, December 22, 2024

Captcha Image

Latest Blog

Businesses have seen an increase in cyberattacks, and this trend is not slowing down in 2025. Today, we want to explore what the future could hold so you can take these insights and apply them to your cybersecurity initiatives in the coming...

Contact Us

Learn more about what Gravité
can do for your business.

Gravité
Level 3 / 19-23 Prospect Street
Box Hill, Victoria 3128

Account Login