When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
These, in turn, allow them to run PowerShell and consequently - deploymalwareon the servers.
The malware then abuses a vulnerability tracked asCVE-2024-30088to escalate privileges and allow the crooks to exfiltrate sensitive information.
(Image credit: Shutterstock)
Affiliation with ransomware players
The name of the malware used in these attacks is STEALHOOK.