Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations

Threat actors have been observed using an open-source tool called PRoot to increase the scope of their operations to several Linux distributions. The Sysdig Threat Research Team (TRT) has discovered the technique and explained earlier this week why it is particularly dangerous.

Read full article on Infosecurity

 


Date:

Categorie(s):