Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I assumed that this meant the attackers logged into their own social network accounts while they were "inside" (i.e. using) compromised machines in the target locations.


That makes sense, thanks. I didn't think they would be silly enough to do that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: