eSentire White Logo

Threat dissection | Dec 11, 2020

Anatomy of an Attack: Gaining Remote Access Using Valid Credentials

When adversaries obtain valid credentials, they can leverage external-facing remote services to gain unauthorized access and/or persist within a network. This threat dissection covers the challenges of suspicious remote access incidents and highlights how proprietary machine learning tools Malkara and esLOG work together to detect them.