One of the threat actor's favorite tactics involves using its malicious access to government infrastructure to attack other government entities...to host malicious payloads, proxy attack traffic, and send spear-phishing emails.
Using this leaked information, we found that the company organized their penetration team into two different subgroups.
#cyberespionage #chinese-hackers #government-entities #phishing-attacks #state-backed-hacking-groups
Collection
[
|
...
]