The attackers exploit known vulnerabilities to execute arbitrary commands and have been observed using various malware, including a custom web shell and open-source tools for post-exploitation activities.
The attackers exploit known vulnerabilities to execute arbitrary commands and have been observed using various malware, including a custom web shell and open-source tools for post-exploitation activities.