<s>
XOR	B-Application
DDoS	I-Application
is	O
a	O
Linux	O
Trojan	O
malware	O
with	O
rootkit	O
capabilities	O
that	O
was	O
used	O
to	O
launch	O
large-scale	O
DDoS	O
attacks	O
.	O
</s>
<s>
Noteworthy	O
about	O
XOR	B-Application
DDoS	I-Application
is	O
the	O
ability	O
to	O
hide	O
itself	O
with	O
an	O
embedded	O
rootkit	O
component	O
which	O
is	O
obtained	O
by	O
multiple	O
installation	O
steps	O
.	O
</s>
<s>
Once	O
Secure	O
Shell	O
credentials	O
are	O
acquired	O
and	O
login	O
is	O
successful	O
,	O
it	O
uses	O
root	O
privileges	O
to	O
run	O
a	O
script	O
that	O
downloads	O
and	O
installs	O
XOR	B-Application
DDoS	I-Application
.	O
</s>
