Free Newsletters for the Channel
Register for Your Free Newsletter Now
February 21, 2020
Sponsored by AT&T Cybersecurity
AT&T Cybersecurity has conducted a technical analysis of the common malicious implants used by threat actors targeting vulnerable Exim, Confluence and WebLogic servers. Upon exploitation, malicious implants are deployed on the compromised machine. While most of the attacks described are historical, we at AT&T Cybersecurity are continuing to see new attacks, which can be further researched here.
The main goal of the malicious implants thus far has been mining Monero cryptocurrency. For the complete, detailed analysis of how an active cryptomining worm works, including scripts, click here.
This guest blog is part of a Channel Futures sponsorship.
Read more about:MSPs
You May Also Like
Zero Trust World: ThreatLocker Unleashes New Tools to Stop ThreatsFeb 27, 2024
Mobile World Congress: VMware Talks SASE, 5G, SD-WANFeb 27, 2024
Zero Trust World: ThreatLocker Providing an Action Plan for Preventing AttacksFeb 26, 2024
The Gately Report: Trellix Partners Shielding SMBs from RansomwareFeb 26, 2024