1 link tagged with all of: threat-intelligence + reconnaissance + ransomware + email-bombing + virtual-machine
Links
The article details a novel cyberattack where adversaries used email bombing to distract a target before introducing a custom QEMU virtual machine into the compromised system. This VM facilitated reconnaissance and potential lateral movement within the network, showcasing an evolution in attack strategies.
email-bombing ✓
virtual-machine ✓
reconnaissance ✓
ransomware ✓
threat-intelligence ✓