According to that technical guidance, Iranian operators often rely on large-scale password-guessing campaigns, exploitation of publicly known software vulnerabilities, and abuse of remote access tools ...