3+ YEARS of stealth! We uncovered new tactics used by the perfctl malware, including a userland rootkit & an SSH backdoor (a single SPACE in /etc/passwd!). More insights: blog.exatrack.com/Perfctl-usin... #cybersecurity #threat_hunting #linux #infosec #perfctl #rootkit #ssh #exatrack
Perfctl malware strikes again as crypto-crooks target Docker Remote API servers
www.theregister.com/2024/10/24/p...
#Infosec #Security #Cybersecurity #CeptBiro #Perfctl #Malware #CryptoCrooks #Docker #RemoteAPIservers
Comment le malware Perfctl a infecté des millions de serveurs Linux
www.lemondeinformatique.fr/actualites/l...
#Infosec #Security #Cybersecurity #CeptBiro #Malware #Cryptominage #Perfctl #Linux #Proxyjacking #Vulnerabilites #MauvaisesConfigurations #Rootkits #EscaladeDesPrivileges #PortesDerobees
www.aquasec.com/blog/perfctl...
#cybersecurity #linux #perfctl
New #Perfctl #Malware Attacking Millions of #Linux #Servers
potatosecuritynews.com/perfctl-malw... #potatosecurity
New #Perfctl #Malware Attacking Millions of #Linux #Servers
cybersecuritynews.com/perfctl-malw... #cybersecurity
Near-'perfctl' Fileless #Malware Targets Millions of #Linux Servers | #netsec #security #perfctl | www.darkreading.com/threat-intel...
New Perfctl Malware Attacking Millions of Linux Servers
cybersecuritynews.com/perfctl-malw...
#Infosec #Security #Cybersecurity #CeptBiro #Perfctl #Malware #LinuxServers
Linux Malware perfctl Attacking Millions of Linux Servers
gbhackers.com/linux-malwar...
#Infosec #Security #Cybersecurity #CeptBiro #Linux #Malware #Perfctl #LinuxServers