Chinese advanced persistent threat groups have been exploiting open-source and living-off-the-land tactics, including the use of Rakshasa and Stowaway reverse proxy programs, PlugX remote access trojan, and custom DLL files for login credential theft, as per Symantec Threat Hunter Team’s analysis.
New stealthy Pumakit Linux rootkit malware spotted in the wild
A Linux rootkit malware named Pumakit, which uses stealth and advanced privilege escalation techniques to remain undetected, has been discovered. It infiltrates systems in multiple