IT security researchers have discovered an unusual type of attack: the perpetrators have set up an emulated Linux environment ...