Man-in-the-middle (MitM) attacks, phishing emails, and the FoxAcid zero-day vulnerability attack platform were also used in the attack, along with Island (for manual exploitation of Solaris systems) ...