"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...
While Cisco breaches often center around hardware and legacy vulnerabilities, a 2024 attack saw an actor download certain files from a developer-facing environment belonging to Cisco. Source code, API ...