thumbnail Triangulation: validators, post-compromise activity and modules | Securelist