![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjX1OrN3yoHpCp3MoqtXumV3yhBw20fgRopKie-_WJUnwDR5Qs9ZrGRpSGgcBJUdnN898Y3W-ajxhQLoYhrf7fZE_jnBKfE0DqcWwcsRtDc_XBP9OEaFZg8m3E247yh3mKss4FIjUQr-JhqJ6nJepPkLAuLVz714JnHmD4ZZkGVQJspDeQyF-cR1hsDL1vO/s1600/chinese-hackers.jpg)
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux hosts as part of an “aggressive” campaign.
Google-owned Mandiant is tracking the activity under its uncategorized moniker UNC5174 (aka Uteus or Uetus), describing it as a “former
Source:: The Hackers News