wyrmroot@programming.devtoTechnology@lemmy.world•Two never-before-seen tools, from same group, infect air-gapped devicesEnglish
8·
21 hours agoSo far, we haven’t been able to trace back to the initial compromise vector in the campaigns seen in our telemetry.
They hypothesize that attaching a compromised USB drive to an air gapped system is to blame. That seems to be a well known vector at this point. Does it matter much what tool is used to copy data once it’s in?
No future issues. But there isn’t that much of the tooth left, I have a crown there which is most of what’s visible. Make sure you look up or have explained to you the steps of the procedure so you aren’t surprised.