An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems.

​An attacker is using the tool to deploy a cryptominer and the Tsunami DDoS bot on compromised systems.