Posted By
Tags
- A
- Abuse
- ACCE
- Actor
- Aes-256
- Affair
- Agent
- An
- Analyst
- Anthony Moore
- Artifact
- Artifacts
- Attachments
- Attack
- Attacker
- Attackers
- Attribute
- Attribution
- Back door
- Backdoor
- Based on
- Being
- Blob
- Breach
- Breached
- C2
- Capital punishment
- Carry
- Chain
- Ciphers
- Client
- Code
- Codeshare agreement
- Collecting
- Command
- Command and control
- Communication
- Communications system
- Complete
- Component
- Components
- Compromise
- Compromised
- Compromises
- Computer security
- Confidence
- Connected
- Controller
- Controllers
- Covert
- Credential
- Cryptography
- Cybersecurity company
- Data
- Data exchange
- Data theft
- Degree
- Deployment
- Detection
- Device
- Diplomatic mission
- Diplomatics
- DLL
- DNS
- Domain
- Domain controller
- Domain name
- Drop
- Email attachment
- Email client
- Embedded
- Encryption
- Environment
- Environments
- ESET
- Establishment
- European
- Evasion
- Evidence
- Exchange
- Execute
- Execution
- Extensions
- Extract
- Files
- Foreign Affair
- Foreign Affairs
- Gov
- Group Policy
- Hacker
- Hacker group
- Hackers
- Hacking
- Header
- Hidden
- High-value target
- Host
- Http header
- Http headers
- HTTPS
- Hypertext Transfer Protocol
- If
- Image file formats
- Images
- Include
- Indicator
- Indicators of compromise
- Infected
- In Operation
- Input/Output Control System
- Install
- Installation
- Institution
- Institutions of the European Union
- Instructions
- Intrusion
- Intrusions
- JPG
- Keys
- Lateral
- Lateral movement
- Legitimacy
- Leverage
- Link
- Loader
- Lua Code
- Machine
- Machines
- Macro
- Maintaining
- Malicious
- Malware
- MAPI
- Medium
- Microsoft
- Microsoft Outlook
- Microsoft Word
- Middle East
- Mimicry
- Ministry
- Minute
- Minutes
- Mission
- Monitoring
- Monitoring tool
- Movement
- Move This
- Network
- Network monitoring
- Network monitoring tool
- New
- Noticed
- Observation
- Only
- Open-source model
- Operations
- Outlook
- Over
- Parse
- Password
- Paths
- Payload
- Persist
- Persistence
- Phishing
- Piece
- Pieces
- Plug-in
- PNG
- Pointing
- Policy
- Portable Network Graphics
- PowerShell
- Procedure
- Product
- Product updates
- Profile
- Profiles
- Programming tool
- Prolonged
- RC4
- Registry
- Replacement
- Request
- Research
- Researcher
- Russian
- Screenshot
- Script
- Security
- Security researcher
- Server
- Similarities
- Software
- Sophistication
- Specific
- Spoofing
- Start
- State-sponsored
- State-sponsored hacker
- Stolen
- Suggest
- Surveillance
- Surveillance data
- System Information
- Systems
- Tactics
- Target
- Targeted
- Targets
- Techniques
- The Command
- The Domain
- Theft
- The hidden
- The host
- The Infected
- The middle
- Threat actor
- Three
- Traffic
- Turla
- Unseen
- Updates
- Uses
- Variation
- VBA
- Via
- When
- Window
- Windows
- Windows Registry
- Workstation
- Zabbix
- Zipping