The malware lets threat actors insert backdoors, steal credentials, and conduct a range of malicious activities on the infected systems. This malware is spread via exploits, phishing emails, USB devices, and brute force attacks in different countries.
Read full article on HackRead