The processes and tools behind a true APT campaign: Exploitation and Installation

In this stage of the APT campaign, conditions have taken a turn for the worse as the attackers have successfully delivered their malicious content

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.

In part three of a series on understanding the processes and tools behind an APT-based incident, CSO examines the process of exploitation and installation. At this stage, things have started to go wrong, as the attacker(s) have been successful in delivering their malicious payload.

[New DDoS malware targets Linux and Windows systems]

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.