The group relies on social engineering tactics, often impersonating employees or contractors to trick IT help desks into granting unauthorized access.

The group relies on social engineering tactics, often impersonating employees or contractors to trick IT help desks into granting unauthorized access.