• @GnuLinuxDude@lemmy.ml
    link
    fedilink
    1710 months ago

    Did I miss it in the article? I cannot determine what the attack vector is. Am I downloading a malicious file? Am I running an insecure publicly facing service?

    • @placatedmayhem@lemmy.ml
      link
      fedilink
      English
      1510 months ago

      This is the backdoor that’s deployed after a host is compromised. How the host is compromised is somewhat irrelevant. It could be exploited manually, social engineering, a worm, etc.