@PogoWasRight @zackwhittaker @campuscodi @euroinfosec @lawrenceabrams @jgreig @securityaffairs @Hackread @h4ckernews For many attackers, managing large amounts of stolen data *clandestinely* is an annoying task they are glad to be rid of once they are paid. It is another part of their operations beyond the intrusion itself that they have to be very careful to manage in a way that cannot be attributed to them. Any remnant they keep is potential evidence against them if they should be apprehended in the future. The easiest and safest path is to get rid of it as soon as possible.
sig_ug@infosec.exchange
@sig_ug@infosec.exchange
Posts
-
When people keep advising victims not to pay ransom because threat actors can't be trusted to really delete all the data, my inner researcher kicks in and wants to know how often that really happens. -
When I say I’m behind on my reading…@neurovagrant Or: “When computers nag and shame you….”
I have an app that shows over 56,000 unread postings. Refuse to be bullied.