An OPSEC error by an Iranian threat actor has laid bare the inner workings of the hacking group by providing a rare insight into the « behind-the-scenes look into their methods. » IBM’s X-Force Incident Response Intelligence Services (IRIS) got hold of nearly five hours worth of video recordings of the state-sponsored group it calls ITG18 (also called Charming Kitten, Phosphorous, or APT35) that
Source de l’article sur The Hacker News