Security Threat Actors Use Malicious File Systems to Scale Crypto-Mining OperationsOctober 15, 2023 Threat actors have been observed using an open-source tool called PRoot to increase the scope of their operations to several…