https://www.bleepingcomputer.com/ne...nux-devices-using-proot-isolated-filesystems/
That's not awesome...
That's not awesome...
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
I’m not sure the attack does need root, much of the utilities out there seem self contained and executable at the user level.The hackers already had root privileges before the hypothetical attack scenario presented in the article. The use of the utility was nothing more than a convenience.
No, that is not awesome, and the journey of never ending patching continues...
The abuse of PRoot by hackers makes these post-exploitation attacks platform and distribution-agnostic, increasing the chances of success and the threat actors' stealthiness.