Analysis of a Multi-Architecture SSH Linux Backdoor

A key aspect in any intrusion is to attempt to gain persistence on the compromised system. Threat actors and criminals assure persistence through different mechanisms including backdoors. The existence of backdoors is nothing new and over the years very popular backdoors targeting most Operating...
By
Angel Alonso-Parrizas
June 17, 2019

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg