An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.




Source link

Author: Fortinet

Article used for cyber security disclosure.