<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Persistent Access Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/persistent-access/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/persistent-access/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 06 May 2021 16:33:46 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Persistent Access Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/persistent-access/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 077 Malicious Office 365 Apps</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-077-malicious-office-365-apps/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 07 May 2021 01:15:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Apps Permissions]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Compromised Office 365 Account]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Malicious Office 365 Apps]]></category>
		<category><![CDATA[Office 365 Apps]]></category>
		<category><![CDATA[Persistent Access]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2512</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 77. This week we&#8217;re going to talk about Malicious Office 365 Apps. Where did this story come from? This week, Brian Krebs from Krebsonsecurity published an article. In this article he was showing how researchers have found that cybercriminals are sending very, very specific links to people with office 365 accounts.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-077-malicious-office-365-apps/">#WeekendWisdom 077 Malicious Office 365 Apps</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 77. This week we&#8217;re going to talk about Malicious Office 365 Apps.<span id="more-2512"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2512-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-077-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-077-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-077-lo.mp4</a></video></div>
<h3>Where did this story come from?</h3>
<p>This week, Brian Krebs from <a href="https://krebsonsecurity.com/" target="_blank" rel="noopener">Krebsonsecurity</a> published <a href="https://krebsonsecurity.com/2021/05/malicious-office-365-apps-are-the-ultimate-insiders/" target="_blank" rel="noopener">an article</a>. In this article he was showing how researchers have found that cybercriminals are sending very, very specific links to people with office 365 accounts. Now when you click these links it prompts people to sign in with the user ID and password for their actual Microsoft 365 account.</p>
<h3>What are these Malicious Office 365 Apps doing?</h3>
<p>Now it&#8217;s not stealing their credentials, but what it is trying to do then it&#8217;s going to get them to install a malicious app that&#8217;s associated with their Microsoft Office 365 account. So it will pop-up and say &#8220;Can you give me permissions to do all these things&#8221; and here is an example of one of these permissions lists.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2514" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/permissionsrequested.jpg" alt="" width="552" height="638" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/permissionsrequested.jpg 552w, https://www.l2cybersecurity.com/wp-content/uploads/2021/05/permissionsrequested-260x300.jpg 260w" sizes="(max-width: 552px) 100vw, 552px" /></p>
<h3>What can they do with all of that?</h3>
<p>Now these are quite extensive and they basically gives the people who control that app the ability to read and respond to emails associated with that individual. So it&#8217;s really, really sneaky. Even if the person goes and changes their password or resets their password, that malicious app is there. They still have access, even passed the password change. It&#8217;s really incredibly clever.</p>
<h3>What can you do to protect yourself</h3>
<p>Now Microsoft do provide solutions now to prevent that for administrators to be able to block that from being able to happen. There&#8217;s full details in <a href="https://krebsonsecurity.com/2021/05/malicious-office-365-apps-are-the-ultimate-insiders/" target="_blank" rel="noopener">the Krebs article</a>. So make sure you take actions to try and prevent these things from happening in your Office 365 account.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-077-malicious-office-365-apps/">#WeekendWisdom 077 Malicious Office 365 Apps</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-077-lo.mp4" length="34903064" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 075 Backdoors</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 01:15:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoors]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Persistence]]></category>
		<category><![CDATA[Persistent Access]]></category>
		<category><![CDATA[RAT]]></category>
		<category><![CDATA[Remote Access Trojan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2500</guid>

					<description><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors. Where does this term Backdoors come from? A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors.<span id="more-2500"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2500-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4</a></video></div>
<h3>Where does this term Backdoors come from?</h3>
<p>A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the back. This door cannot seen from the front of the building.</p>
<h3>In cyber security terminology?</h3>
<p>In cyber security terms a backdoor is a way in that is unseen, into an appliance or device or to a network.</p>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/" target="_blank" rel="noopener">#WeekendWisdom number 61</a>, I talked about a backdoor to a set of firewalls. This was where the manufacturer had put in place a hardcoded password. This password enabled them to be able to sign into those firewalls through the backdoor.</p>
<h3>What way can hackers use Backdoors?</h3>
<p>But hackers tend to use a bit more sophisticated methods to establish their backdoors. If they break into your network they usually want to try and keep their access on there. So they will usually install some program, some piece of software on one of the devices on the network to establish what we call a persistent connection, where they can just keep coming back.</p>
<p>That&#8217;s just a piece of software that opens up a backdoor. Sets up a communication with the outside world that the hacker controls and that they can use to come back in and continue doing whatever they want to do on your network.</p>
<p>So that&#8217;s what a backdoor is in cyber security terms.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4" length="33413833" type="video/mp4" />

			</item>
	</channel>
</rss>
