REFERENCES
- CISA Cyber Resource Hub. https://www.cisa.gov/cyber-resource-hub.
- CISA RVA webpage. https://www.cisa.gov/publication/rva.
- MITRE ATT&CK. https://attack.mitre.org.
- MITRE ATT&CK v9.0, Enterprise Tactics. https://attack.mitre.org/versions/v9/tactics/enterprise/.
- The MITRE Corporation (2015),* APT* 39. https://attack.mitre.org/groups/G0087/.
- National Institute of Standards and Technology, National Vulnerability Database. https://nvd.nist.gov.
Table of Contents
- INTRODUCTION
- INITIAL ACCESS
- COMMAND AND CONTROL (C2)
- LATERAL MOVEMENT
- PRIVILEGE ESCALATION
- COLLECTION
- EXFILTRATION
- CONCLUSION
- REFERENCES