rspec/shared_content/secrets/impact/malware_distribution.adoc

13 lines
531 B
Plaintext
Raw Normal View History

==== Malware distribution
Due to this vulnerability, malware can be stored and spread, both to users of
the service and to other potential targets. +
A malware depends on the attacker's intentions, as the following examples show:
* Cryptojacking malware, whose goal is to "mine" cryptocurrencies on the affected computers or servers.
* Spyware that spies out sensitive information from victims.
In the worst case, malware can cause the target systems to be completely
compromised and allow attackers to infiltrate the systems.