Chinese APT Campaign Stole Data from Victim Organization Using Off-the-shelf Hacking and System Management Tools
The threat actors were able to gain their initial access to the victim by exploiting a vulnerability in a web access server. They further used privilege escalation exploits to steal credentials.