Over that time, the group carried multiple tests to see if the exploit worked and to identify potential victims. It was like “turning the doorknob” to check for access, a researcher says.
This article has been indexed from Dark Reading
Read the original article: