Via node-hopping, the espionage tool can reach computers that aren’t even connected to the internet.
Threatpost

Read More