Question: 195
During incident analysis of a suspected supply chain comprom...
An insurance company recently experienced unauthorized access to its internal network. Upon investigation, the IT team discovered that the attackers had established hidden administrative privileges, allowing them persistent access without detection. Additionally, the team found that critical system files were being modified to facilitate ongoing control.
Which type of malware is most likely responsible for this breach?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! π
No comments yet. Be the first to comment!