You are viewing a single comment's thread.

view the rest of the comments →

0
2

[–] Antikaon [S] 0 points 2 points (+2|-0) ago 

I suspect these exploits and tools are what they use once the target has been hacked. The details of how the initial hacks occur will probably be revealed later. Wikileaks is releasing this stuff in batches similar to the Podesta/DNC leaks. The dirtiest details came later in those cases.