Discovered a series of attacks leveraging a number of vulnerabilities. Upon successful exploitation, the attackers try to download a malicious shell script, which contains further infection behaviors such as downloading and executing...