Today > 1 Critical | 2 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
A new stealthy Linux malware called perfctl has been analyzed. The malware runs two processes: perfctl and a disguised process mimicking known Linux processes. It uses Tor for external communications and local sockets for inter-process communication. After 30 minutes, the attacker drops scripts to …