Remove File names Remove Honeypots Remove IoT Remove Manufacturing
article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

The Outlaw Botnet uses brute force and SSH exploit (exploit Shellshock Flaw and Drupalgeddon2 vulnerability ) to achieve remote access to the target systems, including server and IoT devices. The script looks like the following: Figure 5: Content of the “a” file. It is composed only by three files: “ a”, “run”, “stop ”.

Mining 100