HACKER Q&A
📣 ricberw

How much spyware could have just been loaded onto Capitol computers?


Seems to be that a significant number of offices/computers were left in haste, and those machines were left logged in fully with complete access. Is this as big of an issue as I'm feeling like it is?

Yes, the humans that were in the building have been removed, but what about the digital goodies they potentially left behind?


  👤 bertil Accepted Answer ✓
Computers with email open —Client– is what we saw in tweets, but my understanding is that injecting malware or replacing routers would more relevant. I definitely expect that changing computers can happen with a transition but it’s all too likely that people would overlook connection devices.

👤 ricberw
Genuinely curious to hear if anyone has knowledge of what security protocols are like/how sandboxed each of those machines are/what is likely to be done to verify that keyloggers weren't installed -- and how quickly something like that can be done, as most of those lawmakers rely on those machines for completing their daily work.

👤 aurizon
One hopes that the IT dept can remote kill any connected machine - if they are up to snuff???