Assignment:
Open the MITRE Att&ck website and explore and understand T1559 techniques of MITRE Attack Framework. It has two subclasses, DDE and COM; please make sure you have a good understanding of both.
1. Explain briefly how the subclasses are implemented by giving examples.
2. Identify a threat actor that has recently implemented any of the above methods in their attacks. Can you identify a known campaign while doing your research?