• zante@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    0
    ·
    19 days ago

    No mention of transmission methods as far as I understand the article

    • JohnnyCanuck@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      18 days ago

      They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.