TypeIncidentActors❓UnknownPub. dateDecember 15, 2023Initial accessEnd-user compromiseImpactData exfiltrationObserved techniquesErase logsDisable loggingReverse shellReferenceshttps://www.gem.security/post/uncovering-hybrid-cloud-attacks-through-intelligence-driven-incident-response-part-2-the-attackhttps://www.gem.security/post/uncovering-hybrid-cloud-attacks-through-intelligence-driven-incident-response-part-3-the-responseStatusStubLast editedJun 2, 2024 8:02 AM