Attacker “Patches” Vulnerability Post Exploitation to Lock Out Competition

Red Canary observed the novel tactic in a cluster of activity targeting a legacy vulnerability to access cloud-based Linux systems

This article has been indexed from www.infosecurity-magazine.com

Read the original article: