Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Damn, this seems extremely sophisticated. Someone or a team went through a ton of thought and work on this.

It be would interesting to know how it was originally detected/discovered.

The knowledge of how it works and the level detailed shared in this particular case is also interesting. It’s almost like they are burning this one on purpose.



I’d also love to know how long it took to plan. Was this a years in the making kind of thing? Or just months? Was there a perfect storm that presented the opportunity and so they seized it or was this a concerted and determined effort to infiltrate some specific agency no matter what it took and this happened to be the weak point they could exploit?




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: