Researchers Uncover Chinese Nation State Hackers' Deceptive Attack Strategies

24 March 2023
Attack chains mounted by the group commence with a spear-phishing email to deploy a wide range of tools for backdoor access, command-and-control (C2), and data exfiltration.

>>More