Twitter | Search | |
Bad Horse
THREAD: Just saw this posted by gateway pundit. TL;DR version: This analysis is complete bunk.
Reply Retweet Like More
Bad Horse 9 Jul 17
Replying to @BadHorseOC
I've worked on forensics for multiple hacks, some of them carried out by foreign (state) adversaries.
Reply Retweet Like
Bad Horse 9 Jul 17
Replying to @BadHorseOC
The rate of the initial copy at the file level is meaningless. Hackers will compromise one or more machines and use them to scan for data.
Reply Retweet Like
Bad Horse 10 Aug 17
Esp since that's based on the dirs inside the archive. You would NEVER exfiltrate small files individually across the internet like that.
Reply Retweet Like
Bad Horse 10 Aug 17
Speaking from, ahem, some experience.
Reply Retweet Like
Bad Horse 16 Aug 17
Replying to @sS55752750
LOL,, that's pretty entertaining!
Reply Retweet Like
Bad Horse 1 Aug 18
Did you see this article, Cyber? It reminded me of this exchange. Seems that “Adam” aka Leonard has been very busy playing all sides of this:
Reply Retweet Like
__rish__ 15 Aug 17
Replying to @BadHorseOC
Please mind my limited vocab, but is it a proper term/designation?
Reply Retweet Like
Bad Horse 15 Aug 17
Replying to @prohack
Can you elaborate? Not sure I understand the question. Is what a proper term?
Reply Retweet Like