Attacks by the first threat actor involved abuse of the flaw to deploy the XMRig miner while the second threat actor leveraged a shell script to facilitate miner delivery across a targeted environment’s accessible endpoints.

Article Link: Cryptojacking facilitated by critical Atlassian Confluence exploit | SC Media

1 post – 1 participant

Read full topic

​Attacks by the first threat actor involved abuse of the flaw to deploy the XMRig miner while the second threat actor leveraged a shell script to facilitate miner delivery across a targeted environment’s accessible endpoints.
Article Link: Cryptojacking facilitated by critical Atlassian Confluence exploit | SC Media
1 post – 1 participant
Read full topic