Type: Threat Analysis
Abusing Azure Application Credentials to Attack Supply Chains
In response to the SolarWinds supply chain compromise, the U.S. National Security Agency (NSA) published an advisory describing advanced techniques that threat actors can use to maintain persistent access to compromised cloud tenants and exfiltrate sensitive data.
Print
Share
Comment
Cite
Upload
Translate

APA
() » Abusing Azure Application Credentials to Attack Supply Chains. Retrieved from https://www.truth.cx/2021/01/26/abusing-azure-application-credentials-to-attack-supply-chains/.
MLA" » Abusing Azure Application Credentials to Attack Supply Chains." - , https://www.truth.cx/2021/01/26/abusing-azure-application-credentials-to-attack-supply-chains/
HARVARD » Abusing Azure Application Credentials to Attack Supply Chains., viewed ,
VANCOUVER - » Abusing Azure Application Credentials to Attack Supply Chains. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2021/01/26/abusing-azure-application-credentials-to-attack-supply-chains/
CHICAGO" » Abusing Azure Application Credentials to Attack Supply Chains." - Accessed . https://www.truth.cx/2021/01/26/abusing-azure-application-credentials-to-attack-supply-chains/
IEEE" » Abusing Azure Application Credentials to Attack Supply Chains." [Online]. Available: https://www.truth.cx/2021/01/26/abusing-azure-application-credentials-to-attack-supply-chains/. [Accessed: ]