Trusted relationship attacks: trust, but verify
SecureList
MAY 28, 2024
Access is set up using a certificate or a login/password pair, and in rare cases multi-factor authentication is added. In other cases, they used data that was stolen before the incident began. Rounding out the top three is targeted phishing. Thirdly, such utilities are quite difficult to track.
Let's personalize your content