Technology ❯ Cybersecurity ❯ Malware ❯ Backdoors
The assessment draws from a single C2 configuration, leaving wider targeting possible.