In the penetration stage of an APT attack, which of the following attack behaviors will the attacker generally have?
Long-term latency and collection of key data.
Leak the acquired key data information to a third party of interest
155955cc-666171a2-20fac832-0c042c044
Through phishing emails, attachments with 0day vulnerabilities are carried, causing the user's terminal to become a springboard for attacks.
The attacker sends a C&C attack or other remote commands to the infected host to spread the attack horizontally on the intranet.
Submit