in the DNC Hack

munin

Potential-for-False-Flag-Operations-in-the-DNC-Hack-Jake-Williams

Attribution Considerations

• TTPs used by the attacker

• Specific malware used

• Malware characteristics observed

• Command and control domains, IP

addresses, and other infrastructure

(C) 2016 Rendition Infosec - Jake Williams

More magazines by this user
Similar magazines