Title: How Malicious Actors Abuse Native Linux Tools in Attacks Post by: HCK on October 21, 2022, 04:05:11 pm How Malicious Actors Abuse Native Linux Tools in Attacks
Through our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to launch attacks on Linux environments. In this blog entry, we discuss how these utilities were used and provide recommendations on how to minimize their impact. Source: How Malicious Actors Abuse Native Linux Tools in Attacks (https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html) |