It is possible that an infected computer would infect the post content or that a Key Logger on the client’s machine gave the user’s login to a hacker so that they could infect the content. But it could also just be a coincidence and the hack could have come in from a backdoor or another vulnerability.
Viewing 2 posts - 1 through 2 (of 2 total)
You must be logged in to reply to this topic.
Comments are closed.
Get instant updates to new definitions files as new threats are discovered.
*All fields are required and I will NOT share your information with anyone.