Eric Geller @ericgeller
By exploiting these flaws, the Chinese hackers were able to access target companies' email servers with administrator-like powers and deploy "web shells" to stage further attacks. They rented U.S.-based servers to launch their attacks in order to reduce the odds of detection. — PolitiTweet.org