The evolutions of APT28 attacks
Security Affairs
DECEMBER 4, 2019
In other words all the infrastructures, the samples, the command and controls, the domains and IPs, the certificate, the libraries and, general speaking, all the operations that come before the attack phase in term of environments. For example from 2017 to early 2018 APT28 used specific techniques such as: T1251 , T1329 , T1336 and T1319.
Let's personalize your content