Perfctl malware exploiting exposed Portainer agent and using new SSH persistence
During an incident response for one of our clients, we stumbled upon a server compromised
by the now relatively documented 1234 perfctl
malware.
While it’s not uncommon to find documented threats during incident responses, we discovered that the attacker used new initial access and persistence methods. In this blogpost we will share the newly uncovered knowledge about the threat actor Tools Tactics and Procedures.
Read more...