Threat Hunting Guide for Typhoon Threat Actors: A Comprehensive Handbook for Operations Teams
Typhoon actors employ "living-off-the-land" (LOTL) techniques, leveraging legitimate system tools like PowerShell, Windows Management Instrumentation (WMI), and Remote Desktop Protocol (RDP) for malicious purposes.
This post is for subscribers only
Already have an account? Sign in.