Advisory 2020-008: Copy-Paste Compromises - ACSC

The most common payloads used by the actor were copies of public proof of concept exploit code for a sleep test and reverse shell binary. Other exploit payloads were identified by the ACSC most commonly when the actor’s attempt at a reverse shell was unsuccessful. These included: a payload that attempted to execute a PowerShell reverse shell, ................
................