Here's an interesting read that sheds a lot of light on the social engineering aspect of the attack. https://research.swtch.com/xz-timeline
Just as with phishing attacks, shaming and a sense of urgency are used to drive the attack forward.
Here's an interesting read that sheds a lot of light on the social engineering aspect of the attack. https://research.swtch.com/xz-timeline
Just as with phishing attacks, shaming and a sense of urgency are used to drive the attack forward.