Researchers Uncover Chinese Nation State Hackers' Deceptive Attack Strategies

Attack chains mounted by the group commence with a spear-phishing email to deploy a wide range of tools for backdoor access, command-and-control (C2), and data exfiltration.
Source: cyware.com