By exploiting a zero-day vulnerability in a contractor’s publicly accessible application, it was possible to gain control ...