XorDdos, a Linux botnet malware, has been used extensively—a 254% increase—in the last six months, a Microsoft research reports. The trojan derives its name from its denial-of-service attacks on Linux; it uses XOR-based encryption for communicating with its command-and-control (C2)…
Latest posts - Page 59
Google’s OAuth client library for Java had a major flaw
Last month Google patched a severe flaw in its OAuth client library for Java; the actors can exploit the flaw by using a compromised token to plant arbitrary payloads. The flaw, tracked CVE-2021-22573 and rated 8.7 out of 10 on…
Microsoft highlights attackers are using fileless methods to persist on SQL servers
On Tuesday, Microsoft warned about a malicious campaign targeting SQL servers that uses a built-in PowerShell binary to persist on affected systems. The intrusions, which make the most of brute-force attacks as an initial compromise vector, are exceptional for their…
New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners
Microsoft is warning of a new variant of the srv botnet that’s exploiting multiple security flaws in web applications and databases to install coin miners on both Windows and Linux systems. The tech giant, which has called the new version…
New botnet hacking Windows and Linux using crypto miners
Microsoft has issued a warning about a new version of the srv botnet, which is exploiting several vulnerabilities in web applications and databases. The vulnerability can lead to the installation of coin miners on both Windows and Linux systems. The…
Researchers discovered a new way to run malware on iPhone even when it is turned off
A groundbreaking security assessment of iOS find my team discovered a new attack surface that allows hackers to tinker with the firmware and load malware onto a Bluetooth chip that runs while the iPhone is turned off. When adopting a…
Eternity Project: A Threat Actor’s Swiss Army Knife
Threat actors have unveiled a new all-in-one cybercrime solution that is said to benefit both sophisticated and low-level attackers. The new malware-as-a-service, dubbed ‘Eternity Project,’ may be configured with different modules depending on the type of attack being carried out.…
India demands that VPNs, VPS providers, and cryptocurrency exchanges log user data
According to reports, India now requires data logging from all VPNs, cryptocurrency exchanges and services, VPS providers, and cloud data centre providers. The country has also requested that the relevant services keep users’ personal information and activity records for a…
Malware being sold on Telegram as part of the “Eternity project”
An unknown threat actor has been identified as the developer of a malware toolkit called the “Eternity Project”. The malware allows professional and amateur cybercriminals to buy stealers, clippers, worms, miners, ransomware, and a distributed denial-of-service (DDoS) bot. The malware-as-a-service(MaaS)…
Zyxel rolls out patches for critical firewall OS command injection vulnerability
Zyxel has patched a serious flaw plaguing Zyxel firewall devices, which allows unauthenticated and remote attackers to execute code arbitrarily. “A command injection vulnerability in the CGI program of some firewall versions could allow an attacker to modify specific files…