In a technical deep-dive, IBM’s X-Force Red has revealed a stealthy new lateral movement and credential access technique dubbed RemoteMonologue. This novel attack method weaponizes Windows’ Distributed Component Object Model (DCOM) to coerce remote NTLM authentications—without dropping a single payload. The Component Object Model (COM) is a foundational, albeit archaic, Windows technology that enables software […]
The post RemoteMonologue: New DCOM Attack Bypasses LSASS Protection appeared first on Daily CyberSecurity.