GUEST ESSAY: How stealth, persistence allowed Wipro attacker to plunder supply chain
The Last Watchdog
MAY 10, 2019
Borrowing tools It would not surprise me if this attacker, once inside Wipro’s network, used tactics and techniques that have come into everyday use in advanced persistent threat (APT) types of hacks. One such go-to APT technique is to remotely leverage legit administrative tools to carry out malicious activities — under cover.
Let's personalize your content