The files featured installation scripts, configurations for command-and-control servers, and exploits allegedly designed for targeting routers and firewalls from several companies like Cisco Systems, Juniper Networks, and Fortinet.
This article is from the CBROnline archive: some formatting and images may not be present.
Join Our Newsletter
Want more on technology leadership?
Sign up for Tech Monitor's weekly newsletter, Changelog, for the latest insight and analysis delivered straight to your inbox.