• placatedmayhem@lemmy.ml
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 year ago

    This is the backdoor that’s deployed after a host is compromised. How the host is compromised is somewhat irrelevant. It could be exploited manually, social engineering, a worm, etc.