1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps


IT Security Nachrichten vom | Direktlink: threatpost.com Nachrichten Bewertung

The router DNS hijacking attacks have targeted more than a thousand victims with the Oski info-stealing malware....

Externe Webseite mit kompletten Inhalt öffnen



https://threatpost.com/hackers-hijack-routers-to-spread-malware-via-coronavirus-apps/154170/

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • Azure Marketplace new offers – Volume 37

    vom 467.73 Punkte ic_school_black_18dp
    We continue to expand the Azure Marketplace ecosystem. For this volume, 163 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Applications Accela Civic Platform and Civic Applications: Accela's fast-
  • Azure Marketplace new offers – Volume 38

    vom 421.7 Punkte ic_school_black_18dp
    We continue to expand the Azure Marketplace ecosystem. For this volume, 121 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Applications AGIR Segurança Cibernética - Certificação PCI DSS: Obtai
  • Azure Marketplace new offers – Volume 39

    vom 410.2 Punkte ic_school_black_18dp
    We continue to expand the Azure Marketplace ecosystem. For this volume, 136 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Applications ACR Lift & Shift: Stratum ACR Lift and Shift is an enter
  • Azure Marketplace new offers–Volume 40

    vom 388.16 Punkte ic_school_black_18dp
    We continue to expand the Azure Marketplace ecosystem. For this volume, 212 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Applications 2Care: 2CARE is a healthcare solution that easily captures t
  • UACME - Defeating Windows User Account Control

    vom 270.36 Punkte ic_school_black_18dp
    Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server version too). Admin account with UAC set on default settings required. UsageRun executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.
  • Azure Marketplace new offers – Volume 25

    vom 249.79 Punkte ic_school_black_18dp
    We continue to expand the Azure Marketplace ecosystem. From October 16 to October 31, 2018, 49 new offers successfully met the onboarding criteria and went live. See details of the new offers below: Virtual machines Astadia UI
  • MMD-0030-2015 - New ELF malware on Shellshock: the ChinaZ

    vom 249.28 Punkte ic_school_black_18dp
    The backgroundThe bash Shellshock vulnerability (link) is still proven to be one of the fastest way to spread ELF malware infection to NIX boxes in internet, along with Linux systems which are still having the vulnerable version. This fact that is not kno
  • MMD-0030-2015 - New ELF malware on Shellshock: the ChinaZ

    vom 249.28 Punkte ic_school_black_18dp
    The backgroundThe bash Shellshock vulnerability (link) is still proven to be one of the fastest way to spread ELF malware infection to NIX boxes in internet, along with Linux systems which are still having the vulnerable version. This fact that is not kno
  • MMD-0047-2015 - SSHV: SSH bruter ELF botnet malware w/hidden process kernel module

    vom 189.47 Punkte ic_school_black_18dp
    Background Apparently Linux ELF malware is becoming an interesting attraction from several actors from People Republic of China(in short: PRC). This post is one good example about it. It explains also why myself, from my team (MMD), put many effort t
  • MMD-0047-2015 - SSHV: SSH bruter ELF botnet malware w/hidden process kernel module

    vom 189.47 Punkte ic_school_black_18dp
    Background Apparently Linux ELF malware is becoming an interesting attraction from several actors from People Republic of China(in short: PRC). This post is one good example about it. It explains also why myself, from my team (MMD), put many effort t
  • MMD-0026-2014 - Router Malware Warning | Reversing an ARM arch ELF AES.DDoS (China malware)

    vom 189.26 Punkte ic_school_black_18dp
    Sticky notes, the latest infection report is below tweet:#ELF AES.DDoS (http://t.co/y0D7YwPaD4) #malware hits MIPS/ARM routers. Some AV had bad sigs. http://t.co/TMdxaEDiNh pic.twitter.com/5eaSKJmMZU— ☩MalwareMustDie, NPO (@MalwareMustDie
  • MMD-0026-2014 - Router Malware Warning | Reversing an ARM arch ELF AES.DDoS (China malware)

    vom 189.26 Punkte ic_school_black_18dp
    Sticky notes, the latest infection report is below tweet:#ELF AES.DDoS (http://t.co/y0D7YwPaD4) #malware hits MIPS/ARM routers. Some AV had bad sigs. http://t.co/TMdxaEDiNh pic.twitter.com/5eaSKJmMZU— ☩MalwareMustDie, NPO (@MalwareMustDie

Team Security Diskussion über Hackers Hijack Routers to Spread Malware Via Coronavirus Apps