How security researchers tracked down Kuai and Bujoi malware through multiple vectors including client type, traffic frequency, and destination.

How security researchers tracked down Kuai and Bujoi malware through multiple vectors including client type, traffic frequency, and destination.