- cross-posted to:
- sysadmin@lemmy.world
- cross-posted to:
- sysadmin@lemmy.world
You must log in or register to comment.
Fantastic writeup. I wonder, how does a threat actor get access to a signing key like this? There was no mention of how the key got leaked in the first place.
Below is a more detailed report about the IOCs, but indeed, they don’t seem to want to say anything about the original source of the key leak.
Yes, that part is still undisclosed by Microsoft. It is mentioned in the article as well:
We will continue to closely monitor this incident and provide updates; this is still an ongoing investigation and there are many unanswered questions (how did the threat actor acquire the key? When exactly did it happen? Were other keys compromised as well?).
deleted by creator