Reply to post: Initial compromise?

Researchers smell a cryptomining Chaos RAT targeting Linux systems

pc-fluesterer.info
Linux

Initial compromise?

*IF* the malware is aboard it can do this and that - fine.

Big question is: *HOW* does it get there? What is the attack vector?

If it is installed deliberately I wouldn't call it malware. And the installation does need the /root/ pw, always.

To me this thing sounds more like "Give me all you money or I shoot myself!"

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon