Both blunt and more advanced social engineering approaches used for initial access; the group also has sophisticated hands-on-keyboards capabilities and a diverse toolset.
Exploits beat phishing; hackers love PowerShell; tips on toughening up, and more...