top | item 46265401

(no title)

h1fra | 2 months ago

We don't have a clear explanation of the destructive behavior, right? It looks like it had no real purpose, and there were much more effective ways of destroying their repos. Very script kiddie-like, which does not really fit the main complexity of the virus. Very surprising.

discuss

order

n2d4|2 months ago

It hides the malware's trail, and disguises which keys were leaked, making rotation harder