We examine this situation in terms of the attack ways. Very first, the Attackers gained usage of the OfficeComputer in two ways. 1 group carried out an attack on externalRemoteServices, exactly where a Sonicwall SSL/VPN exploit was found, and they performed the exploitationOfRemoteServices to attack the infectedComputer and enter the https://ieeexplore.ieee.org/document/9941250