How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack
This article walks through a real‑world server breach where a disguised gpg‑agentd process was used to install backdoors, download malicious scripts, exploit Redis, and launch mass scans, and then offers concrete hardening steps to prevent similar compromises.