TABLEFLIP
Description
(Mandiant) To enable continued access directly from the Internet, the threat actor implemented TABLEFLIP (MD5: b6e92149efaf78e9ce7552297505b9d5), a passive traffic redirection utility that listens on all active interfaces for specialized command packets. With this utility in place, and regardless of the ACL’s in place, the threat actor would be able to connect directly to the FortiManager as seen in Figure 15.
Names
Name |
---|
TABLEFLIP |
Category
Malware
Type
- Tunneling
Information
Other Information
Uuid
a7e011e1-7edd-4166-9582-3e200d13910c
Last Card Change
2024-08-26