Researchers warn that the Linux PRoot utility is now frequently used by threat actors in BYOF (Bring Your Own Filesystem) attacks. Unfortunately, the technique can be successfully used on various Linux distributions, like Ubuntu, Fedora, or Alpine. What`s a BYOF Attack? When threat actors create a malicious filesystem that holds a typical set of hijacking […]
The post Threat Actors Use PRoot Isolated Filesystems to Hijack Linux Devices appeared first on Heimdal Security Blog.
This article has been indexed from Heimdal Security Blog
Read the original article: