in the DNC Hack



False Flag Opportunities

• Copying Powershell from other reports

• Planting malware artifacts

• Using compromised C2 servers from multiple

countries rather than registering domains

• Planting document metadata

• Use of social media puppet with broken English

• Publicly discrediting the work of researchers

(C) 2016 Rendition Infosec - Jake Williams

More magazines by this user
Similar magazines