A new Malveillant Linux Intelligent software turns into systems – then closes the door behind to avoid detection


  • Researchers reject the abuse of cybercriminals to access a Linux Cloud server
  • The pirates then created the fault, closing the doors behind them
  • There could be different reasons for repairing faults

A pirate has recently been spotted to correct someone’s vulnerable cloud instance – but he did not do so by the goodness of their hearts.

Red Canary safety researchers observed a threat actor abusing a maximum severity flaw, followed in the form of CVE-2023-46604, to enter a Linux Cloud system.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top