The DFIR Report describes MEOWBACKCONN initial access via a malicious Microsoft Teams MSI installer, followed by encrypted PowerShell backdoor activity and credential access via SAM registry dumping.
The DFIR Report recently observed MEOWBACKCONN again in the wild:
➡️ Initial Access: Malicious Microsoft Teams MSI Installer
➡️ Execution: Encrypted PowerShell backdoor
➡️ Credential Access: SAM Registry Dump
This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.
← Back to Cyber Security