Remix.run Logo
Eridrus 7 months ago

Reusing existing digital compromise toolkits on a presumably far less hardened targets across the street is far easier than trying to deploy hardware thousands of miles away.

The timeline here for the entire sequence of events is 1-2 weeks.