> Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term
It would be nice if somebody could honeypot them to find out the vulns and malware types they are using.
It would be nice if somebody could honeypot them to find out the vulns and malware types they are using.