An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.
This article has been indexed from Fortinet Threat Research Blog
An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.