This Linux malware uses open source software to hide its malicious processes

Security researchers have discovered that a notorious threat group has upgraded its arsenal with a new tool that enable its malware to avoid detection using Linux. 

Researchers at AT&T’s Alien Labs report that the TeamTNT cybercrime group, known for its break-ins into popular cloud instances for mining cryptocurrency, is now using a detection-evasion tool that is based on the open source libprocesshider library.

Source link

The post This Linux malware uses open source software to hide its malicious processes appeared first on TechFans.