Network Activities Parent topic

This section summarizes the changes in network traffic after this threat was executed in a controlled environment. Such information is critical because a threat must engage in network activity in order to realize its goals. Threat Connect provides links to reports about threats that exhibit similar behavior.