Open-source Linux utility is being hijacked to hack devices

0

A new report has highlighted how some hackers are not interested in having malware or viruses installed on the target endpoints, but instead work at bringing their entire toolbox to the victim’s device, which would then help them pick and choose the best malicious tool for each individual target. 

Research from Sysdig, which calls the method “Bring Your Own Filesystem”, or BYOF for short, has found that so far, the method works on Linux devices, thanks to a vulnerable utility called PRoot.

FOLLOW us ON GOOGLE NEWS

 

Read original article here

Denial of responsibility! TechCodex is an automatic aggregator of the all world’s media. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials, please contact us by email – [email protected]. The content will be deleted within 24 hours.

Leave a comment

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More