In this blog entry, we will take a look at the ProxyShell vulnerabilities that were being exploited in these events, and dive deeper into the notable post-exploitation routines that were used in four separate incidents involving these web shell attacks.
Article Link: Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR