The attackers accessed configuration files and modified at least one to set up a GRE tunnel for covert traffic collection.

The attackers accessed configuration files and modified at least one to set up a GRE tunnel for covert traffic collection.