baran 0 Posted June 9 Share Posted June 9 hi marcos , What solution does eset have to deal with this? By what name is it identified? https://duo.com/decipher/iceapple-post-exploitation-framework-deployed-on-exchange-servers Quote Link to comment Share on other sites More sharing options...
Administrators Marcos 4,233 Posted June 9 Administrators Share Posted June 9 Since I was unable to find any of the files listed in the IoC list, I can't tell if or how we detect it. If we get more information, we'll update this topic. Quote Link to comment Share on other sites More sharing options...
baran 0 Posted June 11 Author Share Posted June 11 thank you 🙏 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.