TSEC NEWS: 06.05.21 Cron-Job Fehlerhaft nach PHP Update + PWA mobile + Desktop / 04.05.21 - Android App von TSECURITY 28.04.21 - NEUER SERVER // 26.04.21 ++ Download the Electron-App für tsecurity.de // Über 550 Feed-Quellen


❈ Monero Cryptocurrency campaign exploits ProxyLogon flaws

Hacking securityaffairs.co

Threat actors targeted are exploiting the ProxyLogon vulnerabilities in Microsoft Exchange servers to deploy Monero cryptocurrency miners. Sophos researchers reported that threat actors targeted Microsoft Exchange by exploiting ProxyLogon vulnerabilities to deploy malicious Monero cryptominer in an unusual attack. The unknown attacker is attempting to deliver a payload which is being hosted on a compromised […]

The post Monero Cryptocurrency campaign exploits ProxyLogon flaws appeared first on Security Affairs.

...


Kompletten Artikel lesen (externe Quelle: https://securityaffairs.co/wordpress/116955/cyber-crime/proxylogon-flaws-cryptocurrencyminer.html?utm_source=rss&utm_medium=rss&utm_campaign=proxylogon-flaws-cryptocurrencyminer)

Zur Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

vom 323.48 Punkte
Original release date: February 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result o

AA20-301A: North Korean Advanced Persistent Threat Focus: Kimsuky

vom 202.61 Punkte
Original release date: October 27, 2020SummaryThis advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 7 framework. See the ATT&CK for Enterprise version 7 for all referenced threat actor tactics and techniques. This joint cybersecurity

Monero Cryptocurrency campaign exploits ProxyLogon flaws

vom 189.6 Punkte
Threat actors targeted are exploiting the ProxyLogon vulnerabilities in Microsoft Exchange servers to deploy Monero cryptocurrency miners. Sophos researchers reported that threat actors targeted Microsoft Exchange by exploiting ProxyLogon vulnerabilities to

Researchers Discover Flaws in Digital Currency Monero That Could Reveal Identity of Users

vom 165.15 Punkte
Researchers have discovered flaws in Monero, a digital currency that boasts a high degree of anonymity, that could lead to the identification of users. From a report: Monero is designed to mix up any given Monero "coin" with other payments, so that anyone

ProxyLogon - PoC Exploit for Microsoft Exchange

vom 158.85 Punkte
PoC Exploit for Microsoft Exchange Launche Original PoC: https://github.com/testanullHow to use: python proxylogon.py <name or IP of server> <[email protected]> Example: python proxylogon.py primary [email protected] If successful you will be d

State of Software Security v11: The Most Common Security Flaws in Apps

vom 149.51 Punkte
For our annual State of Software Security report, we always look at the most common types of security flaws found in applications. It???s important to look at the various types of flaws present in applications so that application security (AppSec) teams can make decisions about how to address and fix flaws. For example, high-severity flaws

Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws

vom 124.19 Punkte
Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts from the Cybereason Nocturnus Team have investigated multiple incidents involving the Prometei Botnet. Th

New Monero-Mining Android Malware Discovered

vom 113.2 Punkte
A newly discovered malware family attempts to leverage the (limited) computing power of Android devices to mine for Monero crypto-currency, Trend Micro warns. Dubbed HiddenMiner, the malware was developed with self-protection and persistence mechanisms that a

Crypto-mining Malware Saw New Life Over the Summer as Monero Value Tripled

vom 112.4 Punkte
Malware that mines cryptocurrency made a comeback over the summer, with an increased number of campaigns being discovered and documented by cyber-security firms. From a report: The primary reason for this sudden resurgence is the general revival of the

Security Firm Under Fire Over Disclosure of AMD Chip Flaws

vom 108.24 Punkte
AMD is investigating claims that its processors are affected by more than a dozen serious vulnerabilities, and the company that found the flaws is facing backlash over its disclosure method. Israel-based CTS Labs on Tuesday published a report claiming that it has foun

Theo - Ethereum Recon And Exploitation Tool

vom 104.09 Punkte
Theo aims to be an exploitation framework and a blockchain recon and interaction tool.Features: Automatic smart contract scanning which generates a list of possible exploits. Sending transactions to exploit a smart contract. Transaction pool monitor

How to Track Your Cryptocurrency Trades and Portfolio

vom 93.45 Punkte
People who are used to trading in Bitcoin and Ethereum among other cryptocurrencies already know the lucrative opportunities that are available. Cryptocurrency is a popular opportunity in which almost everyone involved in trading is interested. According to reports, Bitcoin is now an accepted form of payment in many places in

Team Security Diskussion über Monero Cryptocurrency campaign exploits ProxyLogon flaws