Once inside, they must have reviewed the code and made a decision about where to deploy their attack.
...
FishPig recommends users immediately upgrade all FishPig modules or reinstall them from source to ensure none of the infected code remains.
[
add
]
[
|
|
...
]