The Lockheed Martin Cyber Kill Chain® breaks an attack lifecycle into several stages. A threat actor
modified the registry on a compromised Windows system to ensure that their malware would automatically
run at boot time. Into which phase of the Kill Chain would this fall?
© Copyrights Dumpscity 2024. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the Dumpscity.