Eric Geller @ericgeller
#HermeticWiper accepts command-line arguments, suggesting that the hackers could have deployed it via a script, according to CrowdStrike's @Adam_Cyber. The two commands tell the malware: (1) how long to stay asleep on a target before activating (2) when to shut the PC down — PolitiTweet.org