Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term

It would be nice if somebody could honeypot them to find out the vulns and malware types they are using.



How so I get on the list of most interesting persons so I can setup my honeypots? do I have to be jacob appelbaum or assange?

what freaked me out is that they deliver sensible exploits for techie people. go damnit.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: