GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain
The Last Watchdog
MAY 10, 2019
One such go-to APT technique is to remotely leverage legit administrative tools to carry out malicious activities — under cover. PowerShell is commonly used in APT hacks to help the attacker move laterally, while hiding within the noise of normal day-to-day network activity.
Let's personalize your content