![]() DHS analysis identified the threat actors accessing publicly available information hosted by organization-monitored networks during the reconnaissance phase. Staging targets held preexisting relationships with many of the intended targets. The threat actors appear to have deliberately chosen the organizations they targeted, rather than pursuing them as targets of opportunity. This section will provide a high-level overview of threat actors’ activities within this framework. Phases of the model include reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on the objective.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |