Outlaw is Back, a New Crypto-Botnet Targets European Organizations
Security Affairs
APRIL 28, 2020
Based on our findings, there are some similarities in both techniques and architectures with another cybercrime group, which appeared in the wild around 2012, most probably Romanian. 14 ) performs a first check on CPU architecture and a second one on the number of processors. Technical Analysis. The “ run ” script (shown in Fig.
Let's personalize your content