In a recent attack, the group showcased stealthier cross-network activity, thanks to its use of a new BYOVD technique and other tools.
First seen on darkreading.com
Jump to article: www.darkreading.com/threat-intelligence/warlock-ransomware-post-exploitation-activities
![]()

