When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
That can give them a cloud identity access key - and thus a way into the Azure VM.
The final step in the attack is removing any traces of it ever happening.
ViaBleepingComputer