CSO: The processes and tools behind a true APT campaign: Exfiltration
Steve Ragan
22 January, 2014

This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.

In part five of a series on understanding the processes and tools behind an APT-based incident, CSO examines the exfiltration phase. At this point, all of the other phases are complete, and if the campaign hasn't been halted before now, it's likely that data will be removed from the network.

Click the URL above to read the full article
Comments: 0
Votes:17