The routers were hijacked to steal credentials, proxy traffic, and host phishing pages and custom tools
This article has been indexed from www.infosecurity-magazine.com
The routers were hijacked to steal credentials, proxy traffic, and host phishing pages and custom tools