Tor-Based Linux Botnet Abuses IaC Tools to Spread

A recently observed malware botnet targeting Linux systems is employing many of the emerging techniques among cyber-criminals, such as the use of Tor proxies, legitimate DevOps tools, and the removal of competing malware, according to new research from anti-malware vendor Trend Micro.

read more

Read more: Tor-Based Linux Botnet Abuses IaC Tools to Spread

Story added 23. April 2021, content source with full text you can find at link above.


Comments are closed.

Tor-Based Linux Botnet Abuses IaC Tools to Spread

A recently observed malware botnet targeting Linux systems is employing many of the emerging techniques among cyber-criminals, such as the use of Tor proxies, legitimate DevOps tools, and the removal of competing malware, according to new research from anti-malware vendor Trend Micro.

read more

(more…)

Story added 23. April 2021, content source with full text you can find at link above.


Comments are closed.

More antivirus and malware news?


2017 Antivirus News | Powered by WordPress | Fluxipress Theme | Show My IP Address, check blacklists | Free Favicon, Android and Apple Icon Generator | Bitcoin and Crypto Currency News