Eset Report Fontonlake Malware Targets Linux Systems Cybers Guards
The virus family, dubbed FontOnLake, uses a rootkit to hide its existence and uses various command and control servers for each copy, demonstrating how meticulous its operators are to keep a low profile. Furthermore, the malware authors are constantly tweaking the FontOnLake modules, and they employ three types of components that are meant to function together: Trojanized apps, backdoors, and rootkits. FontOnLake appears to have been used in assaults against organisations in Southeast Asia, according to evidence....