Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I skimmed this.

I had to look up "wiper".

TL;DR the GRU first find a vulnerability, and break in; then they consolidate their bridgehead; then they create havoc, either by destroying static data, or by sending bogus information using bogus personas.

This doesn't sound like something I didn't already know.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: