Next-Gen Malware Takes Over Devices With Unique Tool Set

The Shikitega malware takes over IoT and endpoint devices, exploits vulnerabilities, uses advanced encoding, abuses cloud services for C2, installs a cryptominer, and allows full remote control

Article by Tara Seals

twitter.com/wirelesswench

darkreading.com/vulnerabilitie

@ecksmc oh dear, so what does that mean for your average Linux user. I have to admit the technical elements of that article mostly went over my head.

Follow

@Booga only advice i can offer is make sure all patches available for OS are installed 👍

Personally i haven't got a Linux machine mostly play around with different Linux OSes in a VM or duel booted on my Chromebook for tinkering around with

Sign in to participate in the conversation

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.