- cross-posted to:
- cybersecurity@infosec.pub
- cross-posted to:
- cybersecurity@infosec.pub
You must log in or register to comment.
We do not currently know how the initial malware executable reaches its targets, but the file is intended to run explicitly by the victim on their Linux machine.
If you’re running mission-critical software, you shouldn’t be running unknown executables in the first place.