Using a phishing method sent to a google rep, a worm was effectively able to gain access to the employees device and spread it self to the network she was on. From there it hacked every other employee as well as gather DATA from Google's servers which was sent back to the host/attacker. From there he/she/them/it did some reverse engineering on the DATA gathered like the source codes so that Kevin, I mean "Anonymous" could use that code to find easy exploits/backdoors/bugs that he, I mean "Anonymous" could use it to decrypt and spread world wide. That is my opinion. I might be wrong. If you are a heavy researcher, prove me wrong!
top of page
bottom of page