In both cases the attackers used the vulnerability to upload encrypted files with the extension .txt which were then decoded using the Certutil WIndows…
Tag:
In both cases the attackers used the vulnerability to upload encrypted files with the extension .txt which were then decoded using the Certutil WIndows…