Going Behind the Scenes of Cybercrime Group FIN6’s Attack On Retail and Hospitality
A step that an adversary takes during the post exploitation phase of an attack is to establish a command line interface with a computer inside the victim’s network. One recent incident demonstrates the entire intrusion set operated by FIN6, a financially motivated threat actor group.