JP

63%
Flag icon
The attackers were systematic in how they approached their victims, compiling new attack files for each target and setting up separate command servers throughout Europe and Asia so that only two or three infected machines reported to a single server. This segmentation no doubt helped them track different operations and sets of victims, but it also ensured that if any outsider got access to one of the servers, their view of the operation would be very limited.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Rate this book
Clear rating
Open Preview