• @[email protected]
    link
    fedilink
    1810 months ago

    Did I miss it in the article? I cannot determine what the attack vector is. Am I downloading a malicious file? Am I running an insecure publicly facing service?

    • @[email protected]
      link
      fedilink
      English
      1710 months ago

      This is the backdoor that’s deployed after a host is compromised. How the host is compromised is somewhat irrelevant. It could be exploited manually, social engineering, a worm, etc.