March 28, 2024 at 01:19PM
The malicious actor utilized Slack channels to upload stolen data as an exfiltration point.
Based on the meeting notes, it appears that the malicious actor utilized Slack channels to upload the stolen data as an exfiltration point.