Coordinated brute-force campaign targets Apache Tomcat Manager interfaces
The campaign, first observed on June 5, involves brute-force login attempts originating from hundreds of unique IP addresses.
The campaign, first observed on June 5, involves brute-force login attempts originating from hundreds of unique IP addresses.
The company said that this is a preventive action and not related to any recent security incident.
Dubbed ‘Operation Secure’, the effort ran from January to April 2025 and targeted cybercriminal infrastructure worldwide.
The vulnerability, dubbed ‘DanaBleed,’ stemmed from a memory leak in the malware's updated command-and-control protocol.
The attack has targeted high-profile entities in the government and defense sectors in Turkey, Qatar, Egypt, and Yemen.
Researchers report that an exploit for the vulnerability is already being sold on underground forums.
The botnets exploited the flaw to fetch and execute a malicious shell script that serves as a downloader for the main Mirai malware payload.
The researchers noticed overlaps between PurpleHaze and Chinese cyber espionage groups tracked as APT15 and UNC5174.
DNS4EU was created to offer a competitive alternative to widely used public DNS services like Google’s Public DNS and Cloudflare’s DNS.
The group has evolved from a simple SIM-swapping operation into a “global threat” using sophisticated credential-harvesting campaigns.
Showing elements 561 - 570