http://twniiyed6mydtbe64i5mdl56nihl7atfaqtpww6gqyaiohgc75apzpad.onion
We looked at several systems that were supposed to be "under control", and this post summarizes what we found. How we bypassed their security measures, what data we stole without detection, and how we left a backdoor that has been there for months. This is not meant to scare management. It's more like a wake-up call for those responsible for security, a reality that we can help you deal with.