Can anyone tell me...
"FBI has high confidence that Russian state-sponsored cyber actors are using compromised routers to conduct man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations..."
Is there anyone reading this who knows about network thingies?
Because I would love to hear an explanation of how the FBI discovered
1. That it was "Russian state-sponsored cyber actors" responsible, rather than a fat guy sitting in his bedroom (as Mr Trump so eloquently put it).
2. That they were attacking people's routers "to conduct man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations..." rather than for any other given reason? Is there some special revealing bit pattern that shows you are planning espionage, extraction of intellectual property (whatever that may be), maintenance of persistent access to "victim networks", or "potentially" laying any kind of foundations?
Last I heard (when I read "The Cuckoo's Egg" about 30 years ago) most of the US government's computers were pwned - some VAXen still had the credentials "System" and "Manager". So how would they know if any information they get through those systems is right, wrong, not even wrong, or exactly what some unknown black hats want them to think?