Intrusions by Liminal Panda, which had some components resembling those leveraged in LightBasin attacks, involved the utilization of the SIGTRANslator Linux ELF binary, network-scanning CordScan utility, and the PingPong backdoor, according to an analysis from CrowdStrike’s Counter Adversary Operations team.
© Copyright 2024 CNB Tel. All rights reserved