Port 22

Cyber-Espionage Attack Drops Post-Exploit Malware Framework on Microsoft Exchange Servers

IceApple’s 18 separate modules include those for data exfiltration, credential harvesting, and file and directory deletion, CrowdStrike warns.