Meta takes legal action against people behind Facebook, Messenger, Instagram and WhatsApp phishing attacks
The attackers used a relay service Ngrok to redirect internet traffic to the phishing websites.
The attackers used a relay service Ngrok to redirect internet traffic to the phishing websites.
It is unclear who the perpetrator behind the attack is.
It is only a matter of time until Conti and possibly other groups will begin exploiting the Log4j flaw to the fullest, the researchers warned.
The data was reportedly obtained during a phishing attack on an IT firm Dacoll, which provides a 'critical' service for the UK's police forces.
The new bug impacts all Log4j versions from 2.0-beta9 to 2.16.0.
While HelloKitty has been in operation since January 2021, details about the group’s likely location were not previously disclosed.
The malicious actor’s activity started in 2019 and targeted an unnamed Asian airline.
Threat actors linked to the Log4Shell attacks include the Iran-linked APT group PHOSPHORUS, and China-linked HAFNIUM APT.
The company said it has no evidence that safety or security of any customer or other personal data has been compromised.
The new vulnerability affects all versions of Log4j from 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0.
Showing elements 2701 - 2710