Sednit update: How Fancy Bear Spent the Year

Over the past few years the Sednit group has used various techniques to deploy their various components on targets computers. The attack usually starts with an email containing either a malicious link or malicious attachment.

The post Sednit update: How Fancy Bear Spent the Year appeared first on WeLiveSecurity

Article Link: http://feedproxy.google.com/~r/eset/blog/~3/_L65c96kaEQ/