Comment by konaraddi

4 months ago

This post is light on the details of how the hack occurred. Given it talks about their toolkit, am I right to understand that people were tricked into downloading and running malicious software?

the exact details of the attack were still evolving when we pushed the blog post out, so we kept it to what we did know and what could be extrapolated from it