Sept. 8, 2022, 9:47 p.m. | Deeba Ahmed

HackRead | Latest Cyber Crime – InfoSec- Tech – Hacking News www.hackread.com

By Deeba Ahmed


The stealthy malware leverages security flaws to gain privilege escalation and establish persistence.


This is a post from HackRead.com Read the original post: Stealthy Linux Malware Shikitega Deploying Monero Cryptominer

cryptocurrency cryptominer linux linux malware malware monero security shikitega stealthy linux malware vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US