The malware, named Perfctl, exploits over 20,000 misconfigurations and has hidden its presence through rootkits, making detection difficult for administrators.
Perfctl uses advanced stealth techniques, such as deleting its installation binary after execution and communicating via a Unix socket over TOR to evade detection.
Collection
[
|
...
]