The security team at a company, which was a recent target of ransomware, compiled a list of hosts that were identified as impacted and in scope for this incident. Based on the following host list:
Which of the following systems was most pivotal to the threat actor in its distribution of the encryption binary via Group Policy?
jspecht
Highly Voted 1 year, 2 months agogomet2000
Most Recent 8 months, 3 weeks ago