Read Time:5 Second
The backdoor allowed attackers to upload and download files, execute commands and remove their footprint
The backdoor allowed attackers to upload and download files, execute commands and remove their footprint