Exploitation of open-source tools allows attackers to maintain persistent access after initial social engineering, warn ...