2023-08-24 14:27:22 +02:00
|
|
|
==== Malware distribution
|
|
|
|
|
2023-09-14 17:10:18 +02:00
|
|
|
Due to this vulnerability, malware can be stored and spread, both to users of
|
|
|
|
the service and to other potential targets. +
|
|
|
|
A malware depends on the attacker's intentions, as the following examples show:
|
|
|
|
|
|
|
|
* Cryptojacking malware, whose goal is to "mine" cryptocurrencies on the affected computers or servers.
|
|
|
|
* Spyware that spies out sensitive information from victims.
|
|
|
|
|
|
|
|
In the worst case, malware can cause the target systems to be completely
|
|
|
|
compromised and allow attackers to infiltrate the systems.
|
|
|
|
|