The Covert Operator’s Playbook: Infiltration of Global Telecom Networks
Recent activity targeting telecom infrastructure is assessed with high confidence to overlap with Liminal Panda activity. The actors used custom tools, tunneling and OPSEC tactics for stealth.
The post The Covert Operator’s Playbook: Infiltration of Global Telecom Networks appeared first on Unit 42.Unit 42Read More