
Qilin Ransomware Expands Post-Compromise Reconnaissance
Cybersecurity researchers have recently observed the Qilin ransomware gang deploying a highly efficient post-compromise reconnaissance tactic. Instead of relying on noisy network-scanning tools, threat actors are now leveraging PowerShell to secretly enumerate the Remote Desktop Protocol (RDP) authentication history on compromised servers. This technique allows attackers to quickly and quietly map network pivot points, identifying […] The post Qilin Ransomware Expands Post-Compromise Reconnaissance appeared first on Cyber Security News.