| ▲ | rfoo 11 hours ago | |
> Do public reports like this one often go deep enough into the weeds to name names Yes. They often include IoCs, or at the very least, the rationale behind the attribution, like "sharing infrastructure with [name of a known APT effort here]". For example, here is a proper decade-old report from the most unpopular country right now: https://media.kasperskycontenthub.com/wp-content/uploads/sit... It established solid technical links between the campaign they are tracking to earlier, already attributed campaigns. So, even our enemy got this right, ten years ago, there really is no excuse for this slop. | ||