The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of ...