When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Cybersecurity researchers Aqua saw several attacks in the wild, and decided to run a honeypot.
Furthermore, the malware grants the attackers full control over the compromised endpoint.
It is usually used to run large-scale, mission-critical applications in finance, telecommunications, and e-commerce.
It was also said that Hadooken has traces of ransomware functionality.
The second IP address is registered in Russia, under the same hosting company.
It is currently inactive.
ViaThe Register