Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As we've seen, many of the cybersecurity teams have been pwned, so a large part of the breadcrumbs they'd pattern match are already out there. Additionally, if security is poor enough, there can be more than one hacker into a system, which is another way they could accumulate breadcrumbs. This has precedent - there has been malware that uninstalls other malware.


Many? I'm only aware of the Equation group, believed to be the NSA, whose extremely powerful tools were made public.

What other threat actor's internals (and I mean more then chat logs) have been made public?


Why would they have to be made public? They only have to be known to a handful of other nation states.


Because this discussion is about the comment "Nothing is stopping anybody here".

I already conceded in my original response that if you hacked another group first, then yes, you can leave fake breadcrumbs.


My point is that this has already been done. It's not a question of if. Once that's done, these things can spread around.

And I'm also saying you don't necessarily need to hack another group to find their tools.


CIA & GCHQ (Wikileaks).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: