How much spyware could have just been loaded onto Capitol computers?
Seems to be that a significant number of offices/computers were left in haste, and those machines were left logged in fully with complete access. Is this as big of an issue as I'm feeling like it is?
Yes, the humans that were in the building have been removed, but what about the digital goodies they potentially left behind?
Computers with email open —Client– is what we saw in tweets, but my understanding is that injecting malware or replacing routers would more relevant. I definitely expect that changing computers can happen with a transition but it’s all too likely that people would overlook connection devices.
Genuinely curious to hear if anyone has knowledge of what security protocols are like/how sandboxed each of those machines are/what is likely to be done to verify that keyloggers weren't installed -- and how quickly something like that can be done, as most of those lawmakers rely on those machines for completing their daily work.
One hopes that the IT dept can remote kill any connected machine - if they are up to snuff???