Outlaw is Back, a New Crypto-Botnet Targets European Organizations
Security Affairs
APRIL 28, 2020
Once the machine is fully compromised, the attacker will install a complete hacking suite, composed of an IRC bot, an SSH scanner, a bruteforce tool, and an XMRIG crypto-miner. When the machine is completely infected, the installed files are the following: Figure 2: Directory listing. The initial script is the file named “ a ”.
Let's personalize your content