Often, attribution of a threat actor can be determined by which vulnerabilities they are leveraging in order to ultimately run their payloads. This is especially true if it is a 0-day; the chances of two groups simultaneously leveraging an 0-day in the same manner within a short period of time is low.
exploits and 0-day as attribution
0001-01-01
Recent Posts
Linux Persistence: Startup Scripts
2024-11-10 DFIR CTF linux persistence systemd SysV init startup script
Linux Persistence: Cron
2024-11-10 DFIR CTF linux persistence cron