Fill your boots.
https://securelist.com/analysis/publ...ectsauron-apt/
Stuxnet traversed airgaps; it was easy, employees moved it for them via USB drives.
In this case it's using more sophisticated methods to hide itself on those USB drives.
Fill your boots.
https://securelist.com/analysis/publ...ectsauron-apt/
Stuxnet traversed airgaps; it was easy, employees moved it for them via USB drives.
In this case it's using more sophisticated methods to hide itself on those USB drives.
I believe that it is in Mr Robot that they describe a simple way to do it. Someone drop a few infected USB keys in the parking lot of the company they want to hack. You need to have just one employee who pick up one of these keys and use it inside the company to infiltrate it.
Last edited by Perota; 12-08-2016 at 03:50 PM.
The things we regret most is the things we didn't do
There are currently 7 users browsing this thread. (0 members and 7 guests)