Threat Research

    UNC1549 often gained initial access by blending targeted social engineering with the use of compromised third-party accounts. Using credentials stolen from vendors or partners, the group took advantage of legitimate trust relationships to enter victim environments....
    Looking for Something?
    Threat Research Categories:
    Tags