Cyber Defense Advisors

Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations

The hackers used PRoot to increase the scope of their operations to several Linux distributions