The [redacted] actors were probably trying to obtain information associated with election-related hardware and software applications. It is unknown whether the aforementioned spear-phishing deployment successfully compromised all the intended victims, and what potential data from the victim could have been exfiltrated. However, based on subsequent targeting, it was likely that at least one account was compromised.
>The [redacted] actors were probably trying to obtain information associated with election-related hardware and software applications. It is unknown whether the aforementioned spear-phishing deployment successfully compromised all the intended victims, and what potential data from the victim could have been exfiltrated. However, **based on subsequent targeting, it was likely that at least one account was compromised**.
4 comments