Maybe she was trying to say that the hackers (Russia) used malware to get a backdoor into systems and then laid dormant until they were setup enough to use a bunch of different servers as proxy for the attack?
Maybe she was trying to say that the hackers (Russia) used malware to get a backdoor into systems and then laid dormant until they were setup enough to use a bunch of different servers as proxy for the attack?