Naikon APT: Cyber Espionage Reloaded
By Check Point Research
Added
In the following report, Naikon describes the tactics, techniques, procedures and infrastructure that have been used by the Naikon APT group over the 5 years since the last report, and offer some insight into how they were able to remain under the radar.
Tags
Backdoor Malware Threat actor Endpoint Boundary defense Credentials Espionage Data recovery DNS Security incidentTopic Map
