According to new research from Trend Micro, a recently discovered malware botnet targeting Linux systems is using many of the evolving techniques among cyber-criminals, such as the use of legal DevOps software, Tor proxies, and the removal of competing malware.
According to the researchers, the malware can download all of the files it requires from the Tor anonymity network, including post-infection scripts and valid, necessary binaries such as ss, ps, and curl that may be missing from the setting.
The malware can use these tools to send HTTP requests, collect data about the infected device, and even run processes.
To Read More: securityweek