Forum Discussion

kevinh's avatar
kevinh
Bronze III
9 hours ago

Threat Actors: APT43 - Question 7

 

In relation to 

What Resource Development technique was used to facilitate the hosting of beacons, implants, and file exfiltrators?

For some reason 

Obtain Capabilities is wrong, and I tried multiple other names part of the resource development, I am wondering if I should be pivoting into a different area. 

I also tried 

Acquire Infrastructure, and Compromise Infrastructure as well.

No RepliesBe the first to reply