![]() ![]() ![]() We have been investigating this issue and our CSIRT team has been working around the clock to help affected organizations. EDIT 17:40 CET: Added redacted screenshots of exploit traffic EDIT 23.10 CET: Added additional details and attack overview EDIT 19.40 CET: Added methods to identify compromised systems EDIT 17.14 CET: Added link to script to identify infected systems EDIT 14.45 CET: Further clarified the identified steps of the exploit ![]()
0 Comments
Leave a Reply. |