Rapid7’s Post

View organization page for Rapid7, graphic

174,314 followers

🚨 On June 18th, 2024, Rapid7 initiated an investigation into suspicious activity in a customer environment, emanating from the installation of #Notezilla – a program that allows for the creation of sticky notes on a Windows desktop. Rapid7 discovered that the installers for Notezilla, along with 2 related tools, had been trojanized to execute information-stealing malware. Read on in our blog: https://lnkd.in/dcgQ6mUF

  • No alternative text description for this image
Kenneth Strawn

CEHv12 | NCL | 4 years of "x86_64-unknown-none" Rust OSDev | 15-year Linux daily-driver | MITRE eCTF Saddleback College Team Captain | 59.5 units down, 31 units to go until 2025 AS in Cyber Defense

3w

Supply chain attacks like this are invariably the result of either A, neglection to implement any security operations centers on the part of the vendors responsible for developing the software affected, or B, vendors responsible for developing the affected software having small red teams and demanding unrealistic education and/or unrealistic experience requirements to get onto them. Note to recruiters: who you reject will cost you.

Like
Reply

To view or add a comment, sign in

Explore topics