Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth.
The post The Covert Operator's Playbook: Infiltration of Global Telecom Networks appeared first on Unit 42.
This article has been indexed from Unit 42