ToddyCat is making holes in your infrastructure β Source: securelist.com
Source: securelist.com β Author: Andrey Gunkin, Alexander Fedotov, Natalya Shornikova We continue covering the activities of the APT group ToddyCat. In our previous article, we described tools for collecting and exfiltrating files (LoFiSe and PcExter). This time, we have investigated how attackers obtain constant access to compromised infrastructure, what information on the hosts they are [β¦]
La entrada ToddyCat is making holes in your infrastructure β Source: securelist.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.