Hi All
An interesting report from Mandiant, which may be of interest to the community.
Mandiant Intelligence is tracking several ways in which Chinese cyber espionage activity has increasingly leveraged initial access and post-compromise strategies intended to minimize opportunities for detection. Specifically, this analysis highlights Chinese threat groups’ exploitation of zero-days in security, networking, and virtualization software, and targeting of routers and other methods to relay and disguise attacker traffic both outside and inside victim networks. We assess with high confidence that Chinese cyber espionage groups are using these techniques to avoid detection and complicate attribution
https://www.mandiant.com/resources/blog/chinese-espionage-tactics
Regards
Caute_Cautim
Regards
Caute_Cautim