Read Time:5 Second

The backdoor allowed attackers to upload and download files, execute commands and remove their footprint

Read More