Challenge
For our challenge for this chapter, utilize this analysis (and your own research) of the Dridex threat from Count Upon Security: https://countuponsecurity.com/tag/dridex-malware-analysis/
- What techniques are described in the article?
- What technique is generally utilized for initial access by Dridex?
- What impact techniques, if any, are the threat actors behind Dridex known to use?