Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.
この攻撃手法に関連する CVE は登録されていません。
← Technique一覧に戻る