Look up remote desktop in Wiktionary, the free dictionary. |
'It is ironic to see that the second level operators, who are using this kit to spread malware and steal from the end user, are getting duped themselves by the original author,' Deepen Desai, senior director of security research at Zscaler, wrote in a blog post published Thursday.
'The original author is essentially using a crowdsourced model for building a mega Botnet that leverages the second level operators Botnet.'The researchers also explain that the original Cobian developer is 'relying on second-level operators to build the RAT payload and spread infections.'