Talk:Night Dragon Operation

Latest comment: 6 years ago by 86.138.235.131

Seems to be little more than a conspiracy theory (in the most pejorative sense of that term) to me. What I'm reading here is "there are cyber attacks on xyz targets and they all follow the same pattern - first they look for vulnerabilities, then they use those vulnerabilities to get inside the system, then they dig around and figure out how to use those vulnerabilities, finally they unleash their attack". And that similarity in style obviously indicates that these are all coming from the same source. Which would be fine - except that any other model of getting into a system has already been tried and is now easily detected. Any serious attack on a system now MUST follow the "rules" or it'll get detected. (Well, at least until somebody figures out a way to circumvent the rules in a new and interesting way). — Preceding unsigned comment added by 86.138.235.131 (talk) 00:38, 11 April 2018 (UTC)Reply