• GnuLinuxDude@lemmy.ml
    link
    fedilink
    arrow-up
    17
    ·
    1 year ago

    Did I miss it in the article? I cannot determine what the attack vector is. Am I downloading a malicious file? Am I running an insecure publicly facing service?

    • placatedmayhem@lemmy.ml
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 year ago

      This is the backdoor that’s deployed after a host is compromised. How the host is compromised is somewhat irrelevant. It could be exploited manually, social engineering, a worm, etc.