▲ | Eridrus 7 months ago | |
Reusing existing digital compromise toolkits on a presumably far less hardened targets across the street is far easier than trying to deploy hardware thousands of miles away. The timeline here for the entire sequence of events is 1-2 weeks. |