Often, threat actors will use passwords within their operations using their native language or words that are only used within certain groups or cultures. This provides analysts with attribution opportunities that may identify individual threat actors, groups, or their origins.
attribution by password characteristics
0001-01-01
Recent Posts
Linux Persistence: atd
2025-04-01 DFIR CTF linux persistence at atd
Linux Persistence: SSH
2025-03-29 DFIR CTF SSH hardening hunting persistence linux persistence hunting hardening SSH PAM