▲ | Pocomon 5 days ago | |
> The leaked dataset attributed to the “Kim” operator offers a uniquely operational perspective into North Korean-aligned cyber operations. It's puzzling why the NORC hackers didn't use a nearest neighbor hack rather than leaving a trail of bread crumbs all the way back to Pyongyang ;) | ||
▲ | wkat4242 4 days ago | parent [-] | |
Sometimes sending a message is part of the point. And you still have plausible deniability anyway "it was a false flag booo". The Russians do this a lot. This kind of attack that they want everyone to know they are being without telling you they are behind it and denying it in all colours. |