ware. In another example, Target was hacked through a trusted contractor's system who was responsible for managing its HVAC system. If possible, provide examples where your APT actors has abused a trusted relationship to gain access to systems or stolen information from the managed security service providers (MSSPs) (sometimes just MSP) to enhance its evasion techniques. Alternative, a software supply chain attack would also count as a "trusted relationship". Note: a data breach does not count as a trusted relationship and will result in a score of 0 for the posting if you elect to use this as an example. For the purpose of this discussion, I'll bound the scope to software solutions (antivirus, finance/hr/account software, etc.), MSSPs, or other 3rd party relationships be
how adversaries can exploit trusted vendor-to-consumer relationships and describe how they violate the CIA triad by providing an example of this happening (who, what, where, why, when, etc.). For instance, the NotPetya attack compromised an Ukranian tax accounting software called M.E. Doc then used it to spread malware onto every company that used this software. In another example, Target was hacked through a trusted contractor's system who was responsible for managing its HVAC system. If possible, provide examples where your APT actors has abused a trusted relationship to gain access to systems or stolen information from the managed security service providers (MSSPs) (sometimes just MSP) to enhance its evasion techniques. Alternative, a software supply chain attack would also count as a "trusted relationship". Note: a data breach does not count as a trusted relationship and will result in a score of 0 for the posting if you elect to use this as an example.
For the purpose of this discussion, I'll bound the scope to software solutions (antivirus, finance/hr/account software, etc.), MSSPs, or other 3rd party relationships between organizations. Also, please provide citations as applicable.

the solution is an given below :
Step by step
Solved in 2 steps









