January 10, 2024 at 06:26PM
Adversary exploiting two known misconfigurations in big data technologies to deploy Monero cryptominer.
Based on the meeting notes, the key takeaways are:
– The adversary is taking advantage of two known misconfigurations in big data technologies
– The purpose of this exploitation is to deploy a Monero cryptominer