When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Misconfigurations can be pretty much anything, from weak passwords to anything else.

As for the vulnerabilities, the researchers saw CVE-2023-33426 being abused.

Malware

When it works, Perfctl can do a number of things.

Its most prominent feature seems to be mining cryptocurrency for the attackers.

Finally, the malware can serve as a loader, to deploy other programs as necessary.

ViaArs Technica

More from TechRadar Pro