countuponsecurity.com
Digital Forensics – PlugX and Artifacts left behind
When an attacker conducts an intrusion using A, B or C technique, some of his actions leave artifact X, Y or Z behind. So, based on the scenario from the last article about PlugX, I collected a dis…