When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

These, in turn, allow them to run PowerShell and consequently - deploymalwareon the servers.

The malware then abuses a vulnerability tracked asCVE-2024-30088to escalate privileges and allow the crooks to exfiltrate sensitive information.

An abstract image of padlocks overlaying a digital background.

(Image credit: Shutterstock)

Affiliation with ransomware players

The name of the malware used in these attacks is STEALHOOK.

More from TechRadar Pro