2

When reading malware-analysis posts, I see researchers talking about sophisticated state-sponsored actors. How can researchers know when something is state-sponsored from their code/C2 servers alone?

schroeder
  • 123,438
  • 55
  • 284
  • 319

0 Answers0