GCHQ used fake Slashdot, LinkedIn to target employees at Internet exchanges

One would likely install remote administration software of some kind and then have access to do whatever was needed in the future. A keylogger would be likely part of it. As would various back doors. Video and audio capture. File system, registry and bios access. Packet sniffer maybe.

If one were in the position to do such things…

1 Like