vimarsana.com
Home
Live Updates
'IceApple' Post-Exploitation Framework Created for Long-Runn
'IceApple' Post-Exploitation Framework Created for Long-Runn
'IceApple' Post-Exploitation Framework Created for Long-Running Operations
CrowdStrike has detailed a new post-exploitation framework that could be the work of a state-sponsored threat actor, one likely linked to China.
Related Keywords
China ,
,
Microsoft Exchange ,
Internet Information Services ,
Active Directory ,
Iceapple ,
Post Exploitation ,
Malware Framework ,
State Sponsored ,