![]() ![]() ![]() Backdoors – user mode components serving as the main point of communication for its operators.Trojanized applications – modified legitimate binaries that are adjusted to load further components, collect data, or conduct other malicious activities.The malicious code was used by the threat actors to collect credentials from infected systems and acts as a proxy server.įontOnLake is always accompanied by a rootkit to conceal its existence, the components used by the malware can be divided into three following groups that interact with each other: ![]() Modules used by this malware family, which we dubbed FontOnLake, are constantly under development and provide remote access to the operators, collect credentials, and serve as a proxy server.” reads the report published by the experts. “ESET researchers have discovered a previously unknown malware family that utilizes custom and well-designed modules, targeting systems running Linux. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |