TOR-Based Botnet Targeting Linux Systems
Summary
Trend Micro researchers have discovered a botnet malware campaign that makes use of TOR network proxies to download files, abuses infrastructure-as-code (IaC) tools for malware spreading, and installs a cryptocurrency miner.
Threat Type
Malware, Botnet, Cryptomining
Overview
A botnet malware campaign discovered by Trend Micro researchers is making use of TOR proxies to download files including non-malicious binaries it may not find on the victim host but needs in order to carry out its deeds. The ma