Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor
The threat actor used a variety of tactics, techniques, and tools to evade detection and maintain access to the compromised networks, including deploying web shells, exploiting vulnerabilities, and attempting local privilege escalation.