Source |
We Live Security |
Identifiant |
454019 |
Date de publication |
2017-12-21 13:58:28 (vue: 2017-12-21 13:58:28) |
Titre |
Sednit update: How Fancy Bear Spent the Year |
Texte |
Over the past few years the Sednit group has used various techniques to deploy their various components on targets computers. The attack usually starts with an email containing either a malicious link or malicious attachment.
|
Envoyé |
Oui |
Condensat |
appeared attachment attack bear components computers containing deploy either email fancy first group has how link malicious over past post sednit spent starts targets techniques update: used usually various welivesecurity year years |
Tags |
|
Stories |
APT 28
|
Notes |
|
Move |
|