February 12, 2014, 2:38 PM — In part three of a series on understanding the processes and tools behind an APT-based incident, CSO examines the process of exploitation and installation. At this stage, things have started to go wrong, as the attacker(s) have been successful in delivering their malicious payload.
Make no mistake, if the attacker's campaign has made it this far, you have a problem, but you also have a chance to fix it.
To continue reading, register here to become an Insider. It's FREE to join.
This article is part of a series about APT campaigns. The topics covered in this series are:
Weaponization and Delivery
Exploitation and Installation
Command and Control, and