When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Per their investigation, the hackers used custom and open-source tools to deploy attacks to these systems.
After this, the point shell history feature in Linux devices was disabled automatically.

The OpenSSH archive was then compromised, ultimately allowing the malware to attack the system.
It also blocks out hosts and IPS with any links to the cryptomining scam.
The investigation further indicates that the Hiveon OS is the attacker’s main target.

Linux users often use it for cryptomining.











