Technology ❯ Cybersecurity ❯ Cyber Attacks ❯ State-Sponsored Attacks
The operation exploited access at the former shared host to selectively redirect updater traffic to rogue servers.