![]() ![]() To collect data (for instance ssh credentials) or conduct other malicious activity, this malware family uses modified legitimate binaries that are adjusted to load further components. In this blogpost, we summarize the findings published in full in our white paper. Modules used by this malware family, which we dubbed FontOnLake, are constantly under development and provide remote access to the operators, collect credentials, and serve as a proxy server. ![]() ESET researchers discover a malware family with tools that show signs they’re used in targeted attacksĮSET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting systems running Linux.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |