Q: 18
Over the last year, an organization’s HR department has accessed data from its legal department on
the last day of each month to create a monthly activity report. An engineer is analyzing suspicious
activity alerted by a threat intelligence platform that an authorized user in the HR department has
accessed legal data daily for the last week. The engineer pulled the network data from the legal
department’s shared folders and discovered above average-size data dumps. Which threat actor is
implied from these artifacts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.