Remix.run Logo
Pocomon 5 days ago

> The leaked dataset attributed to the “Kim” operator offers a uniquely operational perspective into North Korean-aligned cyber operations.

It's puzzling why the NORC hackers didn't use a nearest neighbor hack rather than leaving a trail of bread crumbs all the way back to Pyongyang ;)

wkat4242 4 days ago | parent [-]

Sometimes sending a message is part of the point. And you still have plausible deniability anyway "it was a false flag booo".

The Russians do this a lot. This kind of attack that they want everyone to know they are being without telling you they are behind it and denying it in all colours.