Anatomy Of A Cyber Extortion Operation
By FireEye, iSIGHT
Added
In this report, they describe FIN10’s activities and tactics, techniques and procedures (TTPs), and provide a glimpse into how they execute their operations.
Tags
Threat actor Extortion Network intrusion Security incident Financial gain Confidentiality Disruption Phishing Availability C2Topic Map
