chaoticalHeavy on Nostr: "The threat actors use the “nohup” command to run the executable in the ...
"The threat actors use the “nohup” command to run the executable in the background to ensure that the process remains active beyond the terminal session. The experts noticed that the attacker appended all the modifications to the ~/.bashrc file, to maintain persistence whenever the user initiates a new Bash shell session."
https://stacker.news/items/377905/r/chaoticalHeavyPublished at
2024-01-05 17:15:34Event JSON
{
"id": "395c897b0c0efb9e7cb1ce0cccb5f8662ca945617f198156404b002f6b1055f9",
"pubkey": "41d0a7151f39c7116baf5e2089a00ecd12a55275951c88e02272b4109733c512",
"created_at": 1704474934,
"kind": 1,
"tags": [],
"content": "\"The threat actors use the “nohup” command to run the executable in the background to ensure that the process remains active beyond the terminal session. The experts noticed that the attacker appended all the modifications to the ~/.bashrc file, to maintain persistence whenever the user initiates a new Bash shell session.\"\n\nhttps://stacker.news/items/377905/r/chaoticalHeavy",
"sig": "89ebe24e51492734308d2ac5e1760a3c95b12c185e13ba59aeaadd864a23b7a6761d56f4dfee680b04e4b715d36005119d38511dc97e45c75c2d214c1549bb84"
}