How to Discover Windows Run Key Persistence When Threat Hunting


Registry run key persistence is a popular technique used by APT37, Dragonfly, APT41 and many other attackers. In this edition of #TechTalkTuesday, we talk through the basics of run key persistence, how groups have used it, and how to look for run key persistence through your threat hunting, cybersecurity, and cyber threat intelligence efforts.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top