Fig 1 Turla backdoor timeline

Fig 1 Turla backdoor timeline

Figure 1 – Turla Outlook backdoor timeline