First page Back Continue Last page Summary Graphics
Complicated
Animal Rights Activist Gets Even
- Technical intelligence against network
- Get IP addresses, locate servers, find versions data
- Trojan horse to gain insider access
- Trojan grants remote network access
- Exploited to gather and exfiltrate company data
- Data sifted through to find names of company people involved in perceived wrong
- Publish names and urge others to attack
- Using an animal rights group, disseminate information as names of furriers
Notes: