Over 9,000 ASUS routers compromised in nation-state-like AyySSHush botnet campaign
The attackers reportedly use a mix of brute-force login attempts, authentication bypasses, and old bugs to gain persistent access.
The attackers reportedly use a mix of brute-force login attempts, authentication bypasses, and old bugs to gain persistent access.
After breaching the MSP, the attackers utilized SimpleHelp to gather intelligence across client environments.
Among the recovered data were personal records tied to millions of citizens, including school records, civil registries, phone logs, and utility billing information.
The attacks, which began in early 2019, resulted in tens of millions of dollars in damages.
The campaign uses fake “AI video generator” websites mimicking legitimate platforms like Luma AI, Canva Dream Lab, and Kling AI.
Earth Lamia primarily exploits SQL injection vulnerabilities in public-facing web applications to infiltrate networks.
The campaign involves fake login pages that mimic employee payroll portals.
The operations are believed to be part of a broader effort to collect intelligence supporting Russian state interests.
The operatives traveled between cities and parked vehicles near potential military sites with dashcams secretly recording for 8 to 12 hours at a time.
LEV builds on the Exploit Prediction Scoring System (EPSS).
Showing elements 591 - 600