Why Hardsec Matters: Protecting Critical Services and Enhancing Resilience

The Evolution of IT Security Defense Mechanisms

In the fast-evolving landscape of cybersecurity, the traditional approach of focusing solely on detecting and responding to threats like malware, ransomware, and phishing attacks has been undergoing a notable shift. As cyber threats continue to grow in complexity and sophistication, there is a heightened awareness of the necessity to implement proactive measures that can thwart potential attacks before they even surface. While having robust defensive mechanisms in place is crucial for safeguarding high-value assets, relying solely on reactive strategies may no longer suffice in the face of evolving cyber threats.

The Significance of Proactive Security Measures

In today’s digital age, where organizations’ critical data and systems are constantly under siege from a myriad of cyber threats, the significance of proactive security measures cannot be overstated. Detecting and responding to attacks after they have been launched is akin to playing catch-up in a game where the adversary holds the upper hand. By implementing proactive security measures that anticipate and preempt potential threats, organizations can significantly enhance their cybersecurity posture and minimize the risk of falling victim to sophisticated attacks.

Shifting Towards Preventative Strategies

The shift towards a more proactive cybersecurity approach involves moving away from a reactive mindset and prioritizing preventative strategies that focus on threat prevention rather than remediation. By leveraging technologies such as threat intelligence, behavioral analytics, and machine learning, organizations can proactively identify and mitigate security threats before they manifest into full-blown attacks. This shift not only empowers organizations to stay one step ahead of cybercriminals but also enables them to fortify their defenses and bolster their resilience against evolving cyber threats.

Redefining the Paradigm of Cybersecurity

In the rapidly evolving landscape of cybersecurity, where the stakes are higher than ever before, redefining the paradigm of cybersecurity is imperative to effectively combatting emerging threats. By embracing a proactive security mindset that emphasizes threat prevention, organizations can fortify their defenses, mitigate risks, and safeguard their critical assets from the ever-evolving threat landscape. It’s not just about having strong defense mechanisms in place—it’s about staying ahead of the curve and outsmarting cyber adversaries before they have a chance to strike.

FBI Takes Down Dispossessor Ransomware Servers in U.S., U.K., and Germany

FBI Disrupts Infrastructure of Ransomware Group Dispossessor

The U.S. Federal Bureau of Investigation (FBI) recently made headlines by announcing its successful operation in disrupting the online infrastructure linked to a burgeoning ransomware group known as Dispossessor, also known by the name Radar. This significant endeavor involved the dismantling of key servers and criminal domains associated with the group.

Crucial Takedown

The FBI’s operation resulted in the dismantling of three servers located in the United States, three servers in the United Kingdom, and a whopping 18 servers in Germany. In addition, the efforts led to the takedown of eight criminal domains based in the U.S. and one in Germany. By targeting this infrastructure, the FBI effectively disrupted the operational capabilities of the Dispossessor ransomware group.

Group Leadership

Dispossessor is believed to be overseen by…

Now, let’s move on to the next segment for further insights and analysis on this remarkable development. Shall we?

Alert: Ukraine Emphasizes Government Computer Targeting Through Phishing Campaign

New Phishing Campaign Targets Ukrainian Computers

The Computer Emergency Response Team of Ukraine (CERT-UA) has raised an alarm about a recent phishing campaign targeting Ukrainian computers. This malicious campaign pretends to be from the Security Service of Ukraine, but in reality, it is a cleverly disguised attempt to distribute malware that can grant remote desktop access to cybercriminals.

According to CERT-UA, this campaign, dubbed UAC-0198, has been actively circulating since July 2024. The impact has been significant, with over 100 computers already falling victim to this stealthy attack. Notably, some of the compromised systems belonged to government agencies, amplifying the potential risks associated with this cyber threat.

Impact on Ukrainian Infrastructure

The infiltration of government-related systems raises concerns about the security of Ukraine’s critical infrastructure. Malware capable of remote desktop access can provide attackers with extensive control over infected devices, potentially leading to data theft, surveillance, or even system manipulation.

Phishing Tactics and Malware Distribution

Phishing remains a prevalent tactic for cybercriminals to deceive unsuspecting users into clicking on malicious links or attachments. By impersonating trusted entities like the Security Service of Ukraine, attackers exploit victims’ trust and curiosity to gain unauthorized access to their devices.

The malware distributed through this phishing campaign can enable remote desktop access, allowing threat actors to intrude into victims’ systems clandestinely. Once installed, this malicious software can operate discreetly in the background, compromising sensitive data and system integrity without the user’s knowledge.

Recommended Security Measures

In light of this emerging threat, CERT-UA advises Ukrainian organizations and individuals to enhance their cybersecurity defenses. Implementing robust email filtering mechanisms to detect and block phishing attempts can fortify the frontline against such deceptive campaigns.

Furthermore, maintaining up-to-date antivirus software and conducting regular security awareness training can empower users to recognize and respond effectively to potential phishing attacks. By staying vigilant and proactive, individuals and organizations can reduce the likelihood of falling victim to malicious campaigns like UAC-0198.

Conclusion

The recent phishing campaign targeting Ukrainian computers under the guise of the Security Service of Ukraine highlights the evolving tactics employed by cybercriminals to infiltrate systems and compromise data. As digital threats continue to evolve, it is imperative for users to stay informed, practice good cybersecurity hygiene, and leverage protective measures to safeguard their digital assets. By fostering a security-conscious culture and adopting proactive security measures, individuals and organizations can mitigate the risks posed by sophisticated cyber threats.

Kibersest Soja Kimusky iz Severne Koreje cilja na univerzitetne profesorje

Kibersest Soja Kimusky iz Severne Koreje cilja na univerzitetne profesorje

Severnokorejska skupina Kimsuky cilja na univerzitetne profesorje s sofisticiranimi phishing napadi

Severnokorejska APT skupina Kimsuky izvaja globalne obveščevalne operacije že od leta 2012. Njihovi cilji vključujejo predvsem Južno Korejo, Združene države Amerike ter Evropo. Skupina začenja svoje operacije z vzpostavljanjem zaupanja prek elektronske pošte in nato dostavi zlonamerne priloge.

Nedavna opozorila NSA in FBI izpostavljajo Kimsukyjevo zlorabo nepravilno konfiguriranih DMARC zapisov za skrivanje phishing poskusov. Napadalci se predstavljajo kot akademiki, novinarji in strokovnjaki za vzhodno Azijo z namenom infiltracije v ciljne organizacije.

Raziskovalci so pred kratkim izkoristili OPSEC napako Kimsukyja ter pridobili občutljive podatke, vključno z izvorno kodo, poverilnicami, dnevniki ter internimi dokumenti skupine.

Analiza podatkov nakazuje, da Kimsuky cilja na univerzitetno osebje za vohunjenje, krajo raziskav in obveščevalnih podatkov, ki koristijo severnokorejskemu Generalnemu obveščevalnemu uradu. To se ujema s Kimsukyjevim zgodovinskim ciljanjem na jedrski, zdravstveni in farmacevtski sektor, kar nakazuje širšo obveščevalno kampanjo za krepitev severnokorejskih znanstvenih sposobnosti.

Webshell “Zeleni dinozaver”

Kimsuky izkorišča kompromitirane internetne gostitelje, vključno z audko [trgovina], dorray [spletno mesto] in drugimi, kot izhodišča za napade. Na teh ogroženih sistemih uvedejo spremenjeno različico spletne lupine Indrajith Mini Shell 2.0, imenovano “Zeleni dinozaver”.

Spletna lupina, ki je brez nepotrebnih funkcij za izogibanje odkritju, omogoča operaterjem nalaganje, prenašanje, preimenovanje in brisanje datotek. Tako omogoča vzpostavitev phishing spletnih strani.

Operaterji Kimsuky so ustvarili phishing strani s kloniranjem zakonitih univerzitetnih portalov za prijavo, specifično ciljanih na Dongduk, Korejsko in Yonsei univerze ter Naver račune.

Spremenili so klonirane strani za izčrpavanje uporabniških poverilnic z onemogočanjem prvotnega šifriranja gesel in preusmeritvijo poskusov prijave na zlonamerno PHP skripto. Ta zajame uporabniško ime, geslo in podatke o poskusu prijave ter jih pošlje na oddaljeni strežnik za nadaljnjo izrabo.

Posnetek zaslona spremenjene prijavne stran Dongdukovega HTML kode

Igralci groženj so kompromitirali prijavno stran Dongduk University tako, da so obšli standardno šifriranje in preusmerili poskuse prijave na zlonamerno PHP skripto, ki beleži ukradene poverilnice v lokalno datoteko. Napad tako prikazuje neuspešno prijavo ob prvem poskusu in uspešno ob drugem.

Za privabljanje žrtev, skripta preusmeri uspešne poskuse prijave na phishing PDF, gostovan na Google Drive, ki posnema zakonito povabilo.

PDF in z njim povezan Google račun izkazujeta močne povezave z Južno-Severnokorejsko izmenjavo in združenjem za podporo sodelovanja, kar se ujema z nedavnim opozorilom o phishingu s strani Asan Inštituta.

PDF z Asan Inštituta za politične študije forum Avgust

Po navedbah Resilience, Kimsuky phishing kampanja uporablja spremenjeno JavaScript kodo za krajo prijavnih poverilnic za Korejsko univerzo in Yonsei univerzo.

Phishing strani posnemajo zakonite prijavne strani in preusmerjajo žrtve na resnične prijavne strani po pridobitvi poverilnic. Medtem se uporablja phishing orodje, ki ni specifično za cilj, za krajo Naver računov z uporabo ponarejene prijavne strani in pojavnih sporočil.

Posnetek zaslona zlonamerne prijavne strani Kimsukyja za Naver

Kims

The Evolution of Phishing Attacks: Adapting to Exploit Current Events

Phishing Attacks on the Rise: The AI Factor

Phishing attacks have been on the rise in recent years, with a staggering 94 percent of businesses reporting being impacted by such attacks in 2023. This represents a 40 percent increase compared to the previous year, as revealed by research from Egress. But what is driving this surge in phishing attacks? One key factor that is gaining attention is the role of artificial intelligence (AI), especially generative AI.

The Role of AI in Phishing Attacks

Generative AI technology has made it significantly easier for cybercriminals to create convincing and sophisticated phishing content. By using AI algorithms, threat actors can craft malicious emails, messages, or websites that closely mimic legitimate communication from trusted sources. This makes it harder for recipients to differentiate between genuine and fraudulent messages, increasing the likelihood of falling victim to phishing scams.

Increased Sophistication and Effectiveness

The use of AI in phishing attacks has led to a higher level of sophistication and effectiveness in these campaigns. Cybercriminals can personalize their attacks by leveraging AI to gather and analyze data about potential targets, making the phishing messages more tailored and convincing. This personalization makes it more challenging for individuals to identify and resist fraudulent attempts, ultimately leading to a higher success rate for attackers.

Challenges for Defenders

The proliferation of AI-powered phishing attacks poses significant challenges for cybersecurity defenders. Traditional security measures may not be equipped to effectively detect and prevent these advanced threats. As AI continues to evolve, cyber defenders must also leverage AI-powered tools and technologies to stay ahead of cybercriminals. This ongoing arms race between attackers and defenders highlights the importance of investing in robust cybersecurity solutions that can adapt to the changing threat landscape.

Protecting Against AI-Powered Phishing Attacks

As the threat of AI-powered phishing attacks continues to grow, organizations must take proactive steps to enhance their security posture. Here are some strategies to consider:

Employee Awareness and Training

Educating employees about the risks of phishing attacks and providing regular training on how to identify and respond to suspicious emails is crucial. By raising awareness and promoting a culture of cybersecurity vigilance, organizations can empower their employees to be the first line of defense against phishing threats.

Implementing Email Security Measures

Deploying robust email security solutions, such as spam filters, email authentication protocols like DMARC, and advanced threat detection technologies, can help organizations detect and block phishing emails before they reach employees’ inboxes. These security measures can significantly reduce the likelihood of successful phishing attacks.

Multi-Factor Authentication (MFA)

Implementing MFA adds an extra layer of security to user accounts by requiring additional verification steps beyond passwords. This can help prevent unauthorized access even if credentials are compromised through phishing attacks.

Regular Security Audits and Updates

Conducting regular security audits, patching vulnerabilities, and updating security measures are essential to staying resilient against evolving threats. By staying proactive and vigilant, organizations can better protect their systems and data from AI-powered phishing attacks.

Conclusion

The increasing prevalence of AI-powered phishing attacks highlights the need for organizations to prioritize cybersecurity and adopt proactive defense strategies. By understanding the role of AI in shaping phishing campaigns, investing in employee training, implementing robust security measures, and staying updated on the latest cybersecurity trends, businesses can strengthen their defenses against evolving threats. As technology continues to advance, staying one step ahead of cybercriminals is key to safeguarding sensitive information and maintaining resilience in the digital landscape.

AI Hangover: The End of the Beginning

The Hangover Arrives: Market Correction and Reassessment

After a period of sustained exuberance, the IT industry is now facing a gentle hangover as the market corrects the share prices of major players such as Nvidia, Microsoft, and Google. This correction comes as a sobering moment for the industry, prompting players to reassess market conditions and adjust their priorities accordingly.

Gartner’s Perspective: The Trough of Disillusionment

In the midst of this correction, Gartner, a leading research and advisory company, has characterized the current state of the IT industry as the “trough of disillusionment.” This phase is marked by a decline in interest and a realization that the promised breakthroughs may not be as immediate or impactful as originally envisioned.

As implementations fail to deliver the expected results, organizations are taking a step back to reevaluate their strategies and investments in emerging technologies. This period of disillusionment serves as a reality check for the industry, prompting a reexamination of expectations and a recalibration of goals.

Reassessing Strategies and Priorities

The market correction and the trough of disillusionment are compelling organizations to reassess their strategies and priorities. In light of the current landscape, businesses are evaluating their technology investments, determining which initiatives are yielding results, and identifying areas that may require adjustment.

For major players like Nvidia, Microsoft, and Google, this period of reassessment may involve recalibrating their product roadmaps, refining their go-to-market strategies, and realigning their investments with emerging trends. By analyzing market dynamics and customer feedback, these companies can position themselves for future success despite the current challenges.

Lessons Learned and Opportunities Ahead

As the IT industry navigates through this phase of correction and reassessment, there are valuable lessons to be learned and opportunities to be seized. Organizations that leverage this period of introspection to refine their strategies, innovate their offerings, and adapt to changing market conditions will emerge stronger and more resilient in the long run.

By acknowledging the challenges of the trough of disillusionment and responding proactively with strategic adjustments, businesses can position themselves for growth and success in the evolving IT landscape. As the market continues to fluctuate and new technologies emerge, organizations that remain agile and adaptive will be best equipped to thrive in the digital age.

Breaking Down the Security Flaws in Solarman and Deye Solar Systems

Critical Security Flaws Discovered in Chinese Solar Management Platforms

In a concerning revelation, cybersecurity researchers have uncovered critical security vulnerabilities in the photovoltaic system management platforms utilized by prominent Chinese companies Solarman and Deye. These vulnerabilities have the potential to be exploited by malicious actors, posing a significant threat to the stability of power grids and potentially leading to disruptive power blackouts.

Implications of the Vulnerabilities

The identified security flaws in the Solarman and Deye platforms could enable attackers to gain unauthorized access and control over vital inverter settings. By manipulating these settings, malicious actors could potentially orchestrate targeted attacks to disrupt power distribution systems, leading to localized power outages or even broader grid failures. Such scenarios could have far-reaching consequences, jeopardizing the reliability and security of critical infrastructure systems.

Significance of Photovoltaic System Vulnerabilities

Photovoltaic systems play a crucial role in the integration of renewable energy sources into existing power grids. As the reliance on solar energy continues to grow, ensuring the security and integrity of photovoltaic system management platforms becomes paramount. Any vulnerabilities in these systems can be exploited to disrupt energy production and distribution, highlighting the need for robust cybersecurity measures to safeguard against potential cyber threats.

The Risk of Cyber Attacks on Power Grids

Cyber attacks targeting power grids have become a significant concern for governments, energy providers, and cybersecurity experts worldwide. The interconnected nature of modern power grids makes them vulnerable to cyber threats, with potential consequences ranging from widespread power outages to economic disruption and critical infrastructure damage. As demonstrated by the vulnerabilities found in Solarman and Deye platforms, the risk of cyber attacks on power grids underscores the importance of proactive cybersecurity strategies.

Preventive Measures and Security Best Practices

To mitigate the risks associated with cyber threats targeting photovoltaic systems and power grids, it is essential for companies and organizations to implement robust cybersecurity measures. This includes regularly updating software and firmware, conducting thorough security assessments, implementing access controls, and monitoring system activity for any unusual behavior. Additionally, fostering a culture of cybersecurity awareness among employees and stakeholders can help bolster defenses against potential cyber attacks.

Collaboration and Information Sharing

In the face of evolving cyber threats, collaboration and information sharing among industry stakeholders, cybersecurity researchers, and government agencies are crucial. By sharing insights, best practices, and threat intelligence, the cybersecurity community can collectively strengthen defenses against emerging cyber threats and vulnerabilities. Together, proactive collaboration can enhance the resilience of critical infrastructure systems and better protect against potential cyber attacks.

Conclusion

The discovery of security flaws in the Solarman and Deye photovoltaic system management platforms serves as a stark reminder of the cybersecurity challenges facing the energy sector. As the world transitions to cleaner energy sources and decentralized power generation, ensuring the security and resilience of photovoltaic systems becomes imperative. By addressing vulnerabilities, implementing strong cybersecurity measures, and fostering collaboration within the cybersecurity community, we can enhance the protection of critical infrastructure systems and safeguard against potential cyber threats.

Critical OpenSSH Vulnerability Patch Released by FreeBSD

FreeBSD Project Releases Security Updates for High-Severirty OpenSSH Vulnerability

The FreeBSD Project has recently rolled out security updates to tackle a significant flaw found within OpenSSH. This flaw opens the door for potential attackers to remotely execute arbitrary code with elevated privileges, which is quite the nightmare for security professionals.

The Details of the Vulnerability

Known as CVE-2024-7589, this vulnerability has been categorized with a CVSS score of 7.4 out of 10.0, signifying its high severity level. The vulnerability stems from a signal handler in sshd(8) that may unwittingly trigger a logging function, causing a chain reaction that attackers can exploit to execute code remotely.

The CVSS score serves as a useful metric to gauge the impact and urgency of such security vulnerabilities. In this case, a score of 7.4 emphasizes the critical nature of this flaw and emphasizes the need for immediate action to mitigate any potential risks.

Implications of the OpenSSH Vulnerability

Cybersecurity professionals are well aware of the significant implications that a vulnerability in OpenSSH can have on systems and networks. OpenSSH is a widely-used tool for secure remote access and communication, making it a prime target for attackers looking to infiltrate systems for malicious purposes.

With the potential for remote code execution and elevated privileges, attackers could wreak havoc on vulnerable systems, compromising sensitive information, disrupting operations, and even gaining unauthorized access to critical resources.

The Importance of Timely Patching and Updates

In light of this high-severity vulnerability in OpenSSH, it is crucial for organizations and users to promptly apply the security updates provided by the FreeBSD Project. Patching known vulnerabilities is a fundamental aspect of maintaining a secure IT environment, as it helps mitigate the risks posed by potential exploits.

By staying proactive and ensuring that systems are up to date with the latest security patches, organizations can significantly reduce their exposure to known security threats and enhance their overall cybersecurity posture. Delaying or neglecting to apply patches could leave systems vulnerable to exploitation and compromise, leading to potential data breaches and other security incidents.

Conclusion

In conclusion, the recent security updates released by the FreeBSD Project highlight the ongoing efforts to address critical vulnerabilities in OpenSSH and bolster the security of IT systems. It is imperative for organizations and users to prioritize prompt patching and updates to mitigate the risks associated with such high-severity flaws. By staying vigilant and proactive in addressing security vulnerabilities, organizations can better protect their systems and data from malicious threats in the ever-evolving cybersecurity landscape.

Industrial Remote Access Tool Ewon Cosy+ Vulnerabilities Exposed: Root Access Attacks Detected

Security Vulnerabilities in Ewon Cosy+ Industrial Remote Access Solution

Recently, security researchers uncovered vulnerabilities in the Ewon Cosy+ industrial remote access solution, shedding light on potential risks that could compromise the security of connected devices. These vulnerabilities provide a pathway for threat actors to exploit the system and gain root privileges, opening the door for further malicious activities.

Potential Threats Posed by Elevated Access

Once attackers obtain root access through the identified vulnerabilities, they can take advantage of the elevated privileges to decrypt encrypted firmware files and sensitive data stored on the devices. This includes potentially exposing passwords in configuration files and retrieving correctly signed X.509 VPN certificates for unauthorized access.

Exploitation Risks and Follow-on Attacks

The ability to decrypt encrypted files and access sensitive data poses significant risks to the confidentiality and integrity of the system. Attackers could weaponize this access to carry out follow-on attacks, compromising the security and functionality of the industrial systems connected to Ewon Cosy+.

Recommendations for Mitigation

In response to these vulnerabilities, users of Ewon Cosy+ are advised to take immediate action to mitigate the risks posed by potential exploitation. This includes applying security patches and updates provided by the vendor to address the identified vulnerabilities and strengthen the overall security posture of the system.

Enhancing Security Measures

Beyond patching known vulnerabilities, organizations should also consider implementing additional security measures to safeguard their industrial remote access solutions. This may include regularly updating firmware, enforcing strong authentication mechanisms, and monitoring network traffic for unusual activities that could indicate unauthorized access attempts.

Importance of Proactive Security Practices

It is crucial for organizations to adopt a proactive approach to cybersecurity to stay ahead of potential threats and vulnerabilities. By staying informed about emerging security risks and promptly addressing identified weaknesses, businesses can better protect their critical infrastructure and sensitive data from malicious actors.

Conclusion

The disclosure of security vulnerabilities in the Ewon Cosy+ industrial remote access solution serves as a timely reminder of the importance of robust cybersecurity practices in safeguarding connected systems. By promptly addressing these vulnerabilities and implementing proactive security measures, organizations can mitigate the risks posed by potential exploitation and defend against malicious attacks targeting their industrial infrastructure.

Opozorilo: Novi napadi botnetov na usmerjevalnike ASUS, odpirajo vrata 63256

Opozorilo: Novi napadi botnetov na usmerjevalnike ASUS, odpirajo vrata 63256

V oktobru 2023 je bilo odkrito razširjeno kibernetsko grožnjo, imenovano Botnet 7777. Ta botnet vključuje približno 10.000 kompromitiranih usmerjevalnikov z odprtim TCP portom 7777, ki ga identificira banner “xlogin:”. Ti kompromitirani usmerjevalniki izvajajo nizko-volumske vztrajne napade s silo na Microsoft Azure in se učinkovito izogibajo zaznavi.

Sprva je bilo sumljeno, da botnet cilja na VIP uporabnike. Vendar so nedavne raziskave pokazale, da botnet deluje nediskriminatorno, kar pomeni, da cilja na širok spekter naprav, kar bistveno poveča njegovo nevarnost. Kljub intenzivnim raziskavam operater botneta še vedno ostaja neznan in ni konkretnih dokazov, ki bi ga povezovali s specifičnimi kibernetskimi kriminalci ali državno sponzoriranimi akterji.

Analize so pokazale, da je grožnja Quad7 razširila svoje operacije botneta tako, da vključuje drugo varianto bota, ki uporablja port 63256, predvsem ciljajoč Asus usmerjevalnike. V zadnjih 30 dneh je bilo evidentiranih kar 12.783 aktivnih botov v obeh različicah porta, kar prikazuje obsežnost in nevarnost tega botneta.

Identificiranih je bilo sedem unikatnih IP-jev za upravljanje botneta, pri čemer so se štirje ujemali s prejšnjimi raziskavami Sekoia, trije pa ostajajo brez atribucije, kar nakazuje na potencialno evolucijo grožnje Quad7. To otežuje preglednost in identifikacijo virov napada, kar je razlog za zaskrbljenost.

Quad7 Boti

V zadnjih 30 dneh je bilo s skeniranjem za odprt port 7777, ki prikazuje banner xlogin:, okuženih kar 7.038 naprav z botnetom Quad7. Takšna skeniranja podatkov sicer nudijo nepopolno sliko obsega botneta, vendar kljub temu kažejo na znatno število kompromitiranih botov, ki se uporabljajo za nizko-volumske napade s silo.

Prevlada kompromitiranih TP-Link usmerjevalnikov je skladna s prejšnjimi raziskavami, kar pomaga pri razumevanju širjenja botneta ter omogoča proaktivne obrambne strategije za zaščito ranljive infrastrukture. Identifikacija specifičnih modelov usmerjevalnikov omogoča bolj ciljno ukrepanje in zaščito pred nadaljnjimi napadi.

Primer Tag-a Usmerjevalnika

Raziskave so tudi pokazale, da gostitelji botneta Quad7 pogosto izpostavljajo SOCKS5 proxy storitev na portu 11288. Ta proxy izkorišča odprtokodni proxy, razvit s strani uporabnika GitHub-a, kar omogoča grožnjam akterjem napade s silo proti Microsoft 365 računom.

Dejavnost gostiteljev z odprtim portom 11288 in skupni banner potrjujejo povezavo z botnetom Quad7. Podatki o odprtih portih so razkrili nov botnet, ki deluje na portu 63256 in primarno cilja Asus usmerjevalnike. To kaže na različne tarče med dvema botnetoma, kar dodatno zapleta situacijo.

Informacije o Odprtih Porta

Medtem ko botnet 7777 cilja na TP-LINK usmerjevalnike in IP kamere, botnet 63256 cilja predvsem na ASUS usmerjevalnike. Z več kot 12.000 kompromitiranimi napravami med obema botnetoma, se akter Quad7 zdi vse bolj nevaren.

NetFlow analiza je identificirala sedem IP-jev pri treh ponudnikih, povezane z botnetom Quad7. En IP komunicira izključno z boti na portu 7777 in omogoča oddaljen dostop do lupine grožnjam akterjem. Drugi IP-ji povezujejo boti na portu 11288, verjetno proxyja napadov, kar potrjuje povezavo med botnetoma.

Botnet Quad7 se vztrajno širi, zdaj vključuje tudi botnet 63256, ki primarno cilja ASUS usmerjevalnike. Kljub tekočim ukrepom za blažitev, botnet ostaja aktiven z znatno osnovo kompromitiranih naprav. Raziskava ekipe Team Cymru je identificirala ključne elemente botnet infrastrukture, vključno s sedmimi IP-ji za upravljanje in vzorci njihove komunikacije.

Preberite tudi:

Objava Opozorilo: Novi Botnet Napadi na ASUS Usmerjevalnike, Odprt Port 63256 se je prvič pojavila na

Posts pagination