• Anonymoose@infosec.pub
    ·
    1 year ago

    It could be a lot of things ranging from state threat actors looking for a toehold into a network or to cost the government time and resources or people doing it for the lulz.