An application owner reports suspicious activity on an internal financial application from various internal users within the past 14 days. A security analyst notices the following:
• Financial transactions were occurring during irregular time frames and outside of business hours by unauthorized users.
• Internal users in question were changing their passwords frequently during that time period.
• A jump box that several domain administrator users use to connect to remote devices was recently compromised.
• The authentication method used in the environment is NTLM.
Which of the following types of attacks is most likely being used to gain unauthorized access?
fercho2023
Highly Voted 1 year, 8 months agoMr_Tttt
1 year, 7 months ago_deleteme_
Highly Voted 1 year, 2 months agoj904
Most Recent 1 year, 6 months agoJT4
1 year, 8 months agoshocky377
1 year, 10 months agoApplebeesWaiter1122
1 year, 11 months agoRyabrre
1 year, 11 months ago