Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

Threat actors exploit ESXi systems as C2 tunnels, leveraging SSH for stealthy persistence, Sygnia reports.

Go to Source