State-Backed Hackers Employ Advanced Methods to Target Middle Eastern and African Governments
The infection chain is triggered by the exploitation of vulnerable on-premises Internet Information Services (IIS) and Microsoft Exchange serves to infiltrate target networks.