Today > | 7 High | 10 Medium | 4 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This report uncovers a sophisticated intrusion campaign involving several malicious modules designed to disable security solutions and execute a persistent crypto-miner. The primary payload, dubbed GHOSTENGINE, leverages vulnerable drivers to terminate and delete known endpoint detection and respon…