• zante@lemmy.wtf
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    No mention of transmission methods as far as I understand the article

    • JohnnyCanuck@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 months ago

      They have an “attack flow” diagram that seems to indicate a hacker installing it directly through a known vulnerability.