The human attack vector
The initial access point was not a system vulnerability—but a human one. Attackers used a combination of mass spam emails to employees, increasing the likelihood that someone would engage, along with targeted phone calls, impersonating IT support staff. The attacker convinced a targeted employee to download a remote administration tool, claiming it was necessary for system updates or security fixes.