The Linux malware ‘Perfctl’ has been targeting servers for the last three-four years by exploiting over 20,000 types of misconfigurations. The malware uses a rootkit to hide itself while stealing CPU resources for crypto mining and masking mining traffic and backdoor commands via Tor-encrypted traffic. Aqua Nautilus researchers have suggested several mitigation strategies including patching all potential vulnerabilities and controlling root access to critical files among others.

Cyber response readiness: Why risk managers must lead from the front – Strategic Risk Global
Summarize this content to a maximum of 60 words: Cyber response readiness: Why risk managers must lead from the front Strategic Risk Global