“The evidence that the Russians hacked the DNC is collapsing”
Posted by Martin C. Fox on March 24, 2017
“Unlike Crowdstrike, ESET doesn’t assign APT28/Fancy Bear/Sednit to a Russian Intelligence Service or anyone else for a very simple reason. Once malware is deployed, it is no longer under the control of the hacker who deployed it or the developer who created it. It can be reverse-engineered, copied, modified, shared and redeployed again and again by anyone. In other words – malware deployed is malware enjoyed!
“In fact, the source code for X-Agent, which was used in the DNC, Bundestag, and TV5Monde attacks, was obtained by ESET as part of their investigation!
“During our investigations, we were able to retrieve the complete Xagent source code for the Linux operating system….”
Wikileaks release of Vault 7 told us the CIA can make malware look like it came from anywhere they chose. Just saying.
Be seeing you