
Legality of Hosting Malware for Attacker to Exfiltrate and Detonate
CybersecurityMalwareHoneypotLegalityHack-back
This content is an AI-generated summary. If you encounter any misinformation or problematic content, please report it to cyb.hub@proton.me.
The post discusses the legality of hosting malware, such as a zip bomb, in a honeypot with the idea that an attacker would exfiltrate and detonate the malware on their own system. It raises the question of whether the attacker, by taking the action of infiltrating unauthorized systems and detonating the files, could be considered solely responsible for the damages, or if this would still be considered a form of hack-back.