Background
This is a short post for supporting the takedown purpose. Warning: Sorry, this time there’s nothing fancy nor “in-depth analysis” 🙂 Yet the current hacking & infecting scheme is so bad, so I think it’s best for all of us (fellow sysadmins in particular) to know this information for mitigation and hardening purpose.

In this case, a bad actor was using java coded malware injected to a

Leave a comment