• Lmaydev@programming.dev
    link
    fedilink
    arrow-up
    1
    arrow-down
    3
    ·
    edit-2
    10 months ago

    That’s exactly the sort of source I was asking for

    Edit: the driver file was used after gaining access to the pc. So quite an involved attack but still really bad.

    Edit 2: so actually it’s nothing to do with having it installed. As the attacker installed it.