How Malicious Actors Abuse Native Linux Tools in AttacksThrough our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to launch attacks on Linux environments. In this blog entry, we discuss how these utilities were used and provide recommendations on how to minimize their impact.
Source:
How Malicious Actors Abuse Native Linux Tools in Attacks