The threat group’s tactics mark a shift from direct exploits to lateral movement through privileged access obtained by ...