Is this some kind of new technique and is it a serious threat? I can't really picture it and I don't recall any similar attack technique on Windows. https://www.bleepingcomputer.com/ne...nux-devices-using-proot-isolated-filesystems/
Underlining added by me. https://sysdig.com/blog/proot-post-explotation-cryptomining/ So how do the threat actors gain access to the target device? Once again another article that fails to properly explain the attack vector from beginning to end. The bleepingcomputer article from the above link also fails to explain this. My feeling is the average Linux home user has nothing to worry about regarding this attack.
"The attacks seen by Sysdig use PRoot to deploy a malicious filesystem on already compromised systems". Just more click-bait scaremongering.
Hackers finally heard Linux users joke that they can not simply infect themeselves without compiling viruses first
To clarify, I didn't think this was a threat to home users, but I wondered if this was a dangerous attack technique on Linux machines like servers for example. It's clear to me that you indeed first need to infect the target device before you can use this tool.