Threat Actors Weaponizing DCOM to Harvest Credentials on Windows Systems

Threat actors are now leveraging the often-overlooked Component Object Model (COM) and its distributed counterpart, Distributed Component Object Model (DCOM), to harvest credentials on Windows systems. As traditional red team methods like direct access to the Local Security Authority Subsystem Service (LSASS) face heightened scrutiny from Microsoft’s enhanced defenses and advanced Endpoint Detection and Response […]

The post Threat Actors Weaponizing DCOM to Harvest Credentials on Windows Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform

Read the original article: