Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wonder whether by now the botnets moved on to authenticating C2 server and using fallbacks methods if the malware discovers an endpoint to be "compromised"


That's been happening for well over 20 years, and I'm sure there are even earlier examples.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: