Return to the home page
Legality of Hosting Malware for Attacker to Exfiltrate and Detonate

Legality of Hosting Malware for Attacker to Exfiltrate and Detonate

CybersecurityMalwareHoneypotLegalityHack-back

The post discusses the legality of hosting malware, such as a zip bomb, in a honeypot with the idea that an attacker would exfiltrate and detonate the malware on their own system. It raises the question of whether the attacker, by taking the action of infiltrating unauthorized systems and detonating the files, could be considered solely responsible for the damages, or if this would still be considered a form of hack-back.