| ▲ | Etheryte 11 hours ago | |
The approach the attacker took makes little sense to me, perhaps someone else has an explanation for it? At first they monitored what's going on and then silently exfiltrated credentials and private repos. Makes sense so far. But then why make so much noise with trying to force push repositories? It's Git, surely there's a clone of nearly everything on most dev machines etc. | ||
| ▲ | chuckadams 11 hours ago | parent | next [-] | |
Malware sometimes suffers from feature creep too. | ||
| ▲ | 11 hours ago | parent | prev [-] | |
| [deleted] | ||