The software in question leaks into your computer Monero (XMR) mining He is doing it. It was reported that the software was a modified version of the “Rocke” group, which was discovered by Talos in August last year.

According to research, one of the first things malicious software does, crypto mining Add firewall rules to control transactions and block other malicious crypto software.

Virus also reported that Chinese Internet giants Tencent and Alibaba have investigated cloud security services and neutralized them to hide. Ryan Olson, vice president of threat intelligence at Palo Alto Networks, said:

"This evolution shows that intruders who have been running host computers operating on cloud platforms are currently trying to escape security platforms specific to these platforms. Bu

Linux da Kötü Amaçlı Yazılım Güvenlik Önlemlerini Devre Dışı Bırakabiliyor!

Linux Can Disable Malware Security Measures!

The virus is also reported to benefit from known vulnerabilities in older versions of Apache Struts 2, Oracle WebLogic and Adobe ColdFusion to infect systems. According to the reportKeep your software up to date, enough to prevent the attack.