New Gitpaste-12 botnet spreads via GitHub and Pastebin
The Gitpaste-12 botnet uses GitHub and Pastebin to host component code and has at least 12 active attack modules.
The Gitpaste-12 botnet uses GitHub and Pastebin to host component code and has at least 12 active attack modules.
A weekly vulnerability digest.
Over the weekend the researchers detected a campaign, which was using a chain of Powershell obfuscated scripts to download Cobalt Strike.
The Ragnar Locker gang claims to have stolen 2 TB of unencrypted files during the attack and demands a $15 million ransom.
The group combines script-kiddie messages and advanced deployment and targeting techniques in attacks.
The incident involved an unauthorized access carried out by a third party, the company said.
The malware was put up for auction, with a starting price of $6,500.
The malicious code discovered in the tainted Twilio library opened a TCP reverse shell on all machines where the library was downloaded.
The vulnerability is being used to bypass authentication procedures and install a backdoor dubbed SLAPSTICK on internet-exposed Solaris servers.
A separate zero-day bug has been fixed in Chrome for Android.
Showing elements 3401 - 3410