Updated July 18, 2019
Initially, the last action was compressed
Monero miner statement and beads.
Investigators say they are the most vulnerable
Although there are signs in China
In a June 13 report by Trend Micro
The virus offers strong vulnerabilities and system connectivity
SSH issues two commands when delivery arrives
Remote control for removing and monitoring affected systems.
In addition, the element can be identified
Enable DDoS attack
Computer criminals make money with cryptocurrencies
Also, do not offer DDoS rentals.
Studies show that users should use ports with secure ports that are regularly opened to support administrators.