Attackers Use Modified Open-Source Reverse Tunneling Utility to Gain Persistence on Infected Systems
Security experts have spotted an interesting case of a suspected ransomware attack that employed custom-made tools typically used by APT (advanced persistent threat) groups.