Attacks on Supercomputers — a New Threat That May Turn the World Upside Down

Stolen Credentials

Kobalos algorithm

Connection methods

  • Connect to a C&C server that will act as a conductor.
  • Inbound connection on a given TCP port.

Sophisticated credential-stealing technique

How to detect the malware?

Final thoughts

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
TechGenyz

TechGenyz

TechGenyz is a leading source of latest technology news, updates on future tech stories, news on Virtual Reality, Augmented Reality, gaming, apps and more.