Today > vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report discusses a case where a CoinMiner threat actor's proxy server, used to access an infected botnet, became the target of a ransomware threat actor's Remote Desktop Protocol (RDP) scan attack. The ransomware threat actor successfully breached the proxy server and distributed ransomware to…