File:APT28 APT29 Techniques - Malware.png
Summary
| Description |
English: Diagram from US-CERT's report on APT28 and APT29 (aka GRIZZLY STEPPE)
Description by source: "Figure 2: APT28's Use of Spearphishing and Stolen Credentials" |
| Date | |
| Source | https://www.us-cert.gov/sites/default/files/publications/JAR_16-20296A_GRIZZLY%20STEPPE-2016-1229.pdf |
| Author | en:United States Computer Emergency Readiness Team |
Licensing
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Federal Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use. |
||
| This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. | ||
Category:CC-PD-MarkCategory:PD US Government#APT28%20APT29%20Techniques%20-%20Malware.png Category:Computer security
