The Linux malware ‘Perfctl’ has been targeting servers for the last three-four years by exploiting over 20,000 types of misconfigurations. The malware uses a rootkit to hide itself while stealing CPU resources for crypto mining and masking mining traffic and backdoor commands via Tor-encrypted traffic. Aqua Nautilus researchers have suggested several mitigation strategies including patching all potential vulnerabilities and controlling root access to critical files among others.

Managing machine identities in 2025
Summarize this content to a maximum of 60 words: Tracking and managing such machine identities needs strong governance