Threat actors often leave behind traces when conducting large-scale attacks, reusing and rotating parts of their infrastructure during campaign setup. Defenders can exploit this behavior to pivot from known indicators and uncover new infrastructure....