One of my servers has been infected by this cryptojacking malware (reporting to the very same IP than in the article).
It seems known for this malware to propagate through some Confluence vulnerabilities, however my server doesn't run Confluence, and the process was actually owned by root
, so the entry point is different.
Is this malware already associated to other software vulnerabilities ? (I couldn't find any.) Are there guidelines to find what could have been the entry point ? Should I report this issue anywhere else ?