Deep Dive Into a Linux Rootkit Malware

An in-depth analysis of how a remote attacker deployed a rootkit and a user-space binary file by executing a shell script.

      

This article has been indexed from Fortinet Threat Research Blog

Read the original article: