Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.

https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.

Scheduled Pinned Locked Moved Uncategorized
7 Posts 3 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • krypt3ia@infosec.exchangeK This user is from outside of this forum
    krypt3ia@infosec.exchangeK This user is from outside of this forum
    krypt3ia@infosec.exchange
    wrote last edited by
    #1

    https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.

    Link Preview Image
    cr0w@infosec.exchangeC netresec@infosec.exchangeN 2 Replies Last reply
    0
    • krypt3ia@infosec.exchangeK krypt3ia@infosec.exchange

      https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.

      Link Preview Image
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchangeC This user is from outside of this forum
      cr0w@infosec.exchange
      wrote last edited by
      #2

      @krypt3ia I know you can't include every incident in the post but the Linux Mint one was another good one. Changing the hash on the website was such a nice touch.

      netresec@infosec.exchangeN 1 Reply Last reply
      1
      0
      • R relay@relay.infosec.exchange shared this topic
      • krypt3ia@infosec.exchangeK krypt3ia@infosec.exchange

        https://krypt3ia.wordpress.com/2026/05/13/cyber-supply-chain-attacks-early-internet-to-today/ thing done.

        Link Preview Image
        netresec@infosec.exchangeN This user is from outside of this forum
        netresec@infosec.exchangeN This user is from outside of this forum
        netresec@infosec.exchange
        wrote last edited by
        #3

        @krypt3ia Great writeup! The visual chart with attacks grouped based on generation/method is also very interesting. Do the colors in the chart (red/orange/grey) represent something? Also, are the arrows in the chart to indicate the chronological order of various attacks -- or do they have some other meaning?

        krypt3ia@infosec.exchangeK 1 Reply Last reply
        0
        • cr0w@infosec.exchangeC cr0w@infosec.exchange

          @krypt3ia I know you can't include every incident in the post but the Linux Mint one was another good one. Changing the hash on the website was such a nice touch.

          netresec@infosec.exchangeN This user is from outside of this forum
          netresec@infosec.exchangeN This user is from outside of this forum
          netresec@infosec.exchange
          wrote last edited by
          #4

          @cR0w @krypt3ia The Havex backdoors by Energetic Bear / Dragonfly / Crouching Yeti from 2013 were also quite significant, and very under-reported on.

          cr0w@infosec.exchangeC 1 Reply Last reply
          1
          0
          • netresec@infosec.exchangeN netresec@infosec.exchange

            @cR0w @krypt3ia The Havex backdoors by Energetic Bear / Dragonfly / Crouching Yeti from 2013 were also quite significant, and very under-reported on.

            cr0w@infosec.exchangeC This user is from outside of this forum
            cr0w@infosec.exchangeC This user is from outside of this forum
            cr0w@infosec.exchange
            wrote last edited by
            #5

            @netresec @krypt3ia Yes! I forgot about that one.

            netresec@infosec.exchangeN 1 Reply Last reply
            0
            • cr0w@infosec.exchangeC cr0w@infosec.exchange

              @netresec @krypt3ia Yes! I forgot about that one.

              netresec@infosec.exchangeN This user is from outside of this forum
              netresec@infosec.exchangeN This user is from outside of this forum
              netresec@infosec.exchange
              wrote last edited by
              #6

              @cR0w @krypt3ia Here's a refresher on #Havex
              https://netresec.com/?b=14ABDA4

              1 Reply Last reply
              0
              • netresec@infosec.exchangeN netresec@infosec.exchange

                @krypt3ia Great writeup! The visual chart with attacks grouped based on generation/method is also very interesting. Do the colors in the chart (red/orange/grey) represent something? Also, are the arrows in the chart to indicate the chronological order of various attacks -- or do they have some other meaning?

                krypt3ia@infosec.exchangeK This user is from outside of this forum
                krypt3ia@infosec.exchangeK This user is from outside of this forum
                krypt3ia@infosec.exchange
                wrote last edited by
                #7

                @netresec Chronological and colors, just pretty.

                1 Reply Last reply
                1
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups