Bitcoin mining malware, analysis of an infection
When an attacker manages to compromise and get root access to a server or your notebook, his main goal usually is to steal sensitive information, to use it as a bridgehead for attacking other targets, to send spam or deny a service for causing money losses. When I started my sysadmin career path, more than ten years ago, almost all [...]