News about organizational emails that were leaked to social media, possibly due to a breach in the organizations network security, was just received. You are expected to examine the news and carefully collect clues regarding the nature and specific activity of the infection. During this complex investigation, you will be exposed to various techniques for persistency, lateral movement, data exfiltration and evasion used by the attacker.
News about organizational emails that were leaked to social media, possibly due to a breach in the organizations network security, was just received. You are expected to examine the news and carefully collect clues regarding the nature and specific activity of the infection. During this complex investigation, you will be exposed to various techniques for persistency, lateral movement, data exfiltration and evasion used by the attacker.