20-07-2024, 08:28 PM
Attackers could use an exploit for the vulnerability, or the installation image could contain a technical account for support access, and the attackers found out about it and used such an account. The easiest option is to reinstall everything from the very beginning, check and clean users, use updates and an antivirus program. and the most correct option for me is to use Linux