Read this exclusive research report to discover:

  • First-ever disclosure of Enfal’s C2 communication protocols
  • In-depth analysis of advanced encryption and obfuscation techniques
  • Full visibility into attack campaign, including list of victims
  • Global dispersion of Enfal’s operations from 2008-2015