Tag: worm
-
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
by
in SecurityNewsCybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka Dota) that’s known for targeting SSH servers with weak credentials.”Outlaw is a Linux malware that relies on SSH brute-force attacks, cryptocurrency mining, and worm-like propagation to infect and maintain control over systems,” Elastic Security Labs said in a new analysis First…
-
New Outlaw Linux Malware Using SSH brute-forcing To Maintain Botnet Activities for long Time
A persistent Linux malware known as >>Outlaw
-
Raspberry Robin: From Copy Shop Worm to Russian GRU Cyber Tool
Raspberry Robin, also known as Roshtyak or Storm-0856, has evolved from a simple worm targeting copy shops to First seen on securityonline.info Jump to article: securityonline.info/raspberry-robin-from-copy-shop-worm-to-russian-gru-cyber-tool/
-
Raspberry Robin: From Copy Shop Worm to Russian GRU Cyber Tool
Raspberry Robin, also known as Roshtyak or Storm-0856, has evolved from a simple worm targeting copy shops to First seen on securityonline.info Jump to article: securityonline.info/raspberry-robin-from-copy-shop-worm-to-russian-gru-cyber-tool/
-
Raspberry Robin Unveils 200 Unique Domains Used by Threat Actors
by
in SecurityNewsIn a significant development, cybersecurity firm Silent Push has identified nearly 200 unique command and control (C2) domains associated with the Raspberry Robin malware. This discovery sheds new light on the infrastructure used by this sophisticated threat actor group, which has evolved from a USB worm to a formidable initial access broker (IAB) for various…
-
Defending against USB drive attacks with Wazuh
by
in SecurityNewsUSB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to data breaches, financial losses, and operational disruptions, with lasting impacts on an organization’s reputation. An example is the Stuxnet worm discovered in 2010, a malware…
-
DEF CON 32 Compromising Electronic Logger Creating Truck2Truck Worm
by
in SecurityNewsAuthors/Presenters: Jake Jepson, Rik Chatterjee Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/12/def-con-32-compromising-electronic-logger-creating-truck2truck-worm/
-
Mustang Panda Feeds Worm-Driven USB Attack Strategy
by
in SecurityNewsA fresh wave of attacks on APAC government entities involves both self-propagating malware spreading via removable drives and a spear-phishing campaig… First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/mustang-panda-worm-driven-usb-attack
-
New CMoon USB worm targets Russians in data theft attacks
by
in SecurityNewsA new self-spreading worm named ‘CMoon,’ capable of stealing account credentials and other data, has been distributed in Russia since early July 2024 … First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-cmoon-usb-worm-targets-russians-in-data-theft-attacks/
-
Fujitsu Suffers Worm-Like Attack From Something That Wasn’t Ransomware
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/endpoint-security/fujitsu-suffers-worm-attack-not-ransomware
-
‘P2PInfect’ Worm Grows Teeth With Miner, Ransomware & Rootkit
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/p2pinfect-worm-miner-ransomware-rootkit
-
New P2Pinfect version delivers miners and ransomware on Redis servers
by
in SecurityNewsResearchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads. Cado Security researchers warn… First seen on securityaffairs.com Jump to article: securityaffairs.com/164968/malware/p2pinfect-delivers-miners-ransomware-on-redis.html
-
P2Pinfect Worm Now Dropping Ransomware on Redis Servers
by
in SecurityNewsThe P2Pinfect worm targeting Redis servers has been updated with ransomware and cryptocurrency mining payloads. The post nfect worm targeting Redis se… First seen on securityweek.com Jump to article: www.securityweek.com/p2pinfect-worm-now-dropping-ransomware-on-redis-servers/
-
Cloud-based worm now spews ransomware and cryptominer gloom
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/news/p2pinfect-evolves-to-introduce-ransomware-and-cryptominer-payloads
-
Stuxnet, The Malware That Propagates To Air-Gapped Networks
Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA) systems used in industrial facilities. By exploi… First seen on gbhackers.com Jump to article: gbhackers.com/stuxnet-malware-air-gapped-networks/
-
VirusTotal Celebrates 20th Anniversary, What’s Next?
by
in SecurityNewsVirusTotal, a leading online service for analyzing files and URLs for viruses, worms, trojans, and other malicious content, is celebrating its 20th an… First seen on gbhackers.com Jump to article: gbhackers.com/virustotal-celebrates-anniversary/
-
Millions Of IPs Remain Infected By USB Worm Years After Its Creators Left It For Dead
by
in SecurityNews
Tags: wormFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/35817/Millions-Of-IPs-Remain-Infected-By-USB-Worm-Years-After-Its-Creators-Left-It-For-Dead.html
-
Self-Spreading PlugX USB Drive Malware Plagues Over 90k IP Addresses
by
in SecurityNewsMore than 90,000 unique IPs are still infected with a PlugX worm variant that spreads via infected flash drives. The post n 90,000 unique IPs are stil… First seen on securityweek.com Jump to article: www.securityweek.com/self-spreading-plugx-usb-drive-malware-plagues-over-90k-ip-addresses/
-
Infections with abandoned PlugX USB worm continue to be prevalent
by
in SecurityNewsFirst seen on scmagazine.com Jump to article: www.scmagazine.com/brief/infections-with-abandoned-plugx-usb-worm-continue-to-be-prevalent
-
Trucktruck worm could infect and disrupt entire US commercial fleet
by
in SecurityNews
Tags: wormFirst seen on theregister.com Jump to article: www.theregister.com/2024/03/22/boffins_tucktotruck_worm/
-
Raspberry Robin Morphs, Now Spreads via Windows Script Files
Malware Platform Operators Taket Steps to Obfuscate Code. Threat actors behind malware distribution platform Raspberry Robin worm have shifted tactics… First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/raspberry-robin-morphs-now-spreads-via-windows-script-files-a-24844
-
Raspberry Robin Malware Now Using Windows Script Files to Spread
by
in SecurityNewsRaspberry Robin, the highly adaptable and evasive worm and malware loader that first appeared on the cyberthreat scene in 2021, is now using a new met… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/04/raspberry-robin-malware-now-using-windows-script-files-to-spread/
-
Apple M-Series FAIL: GoFetch Flaw Finds Crypto Keys
by
in SecurityNewsGoFAIL: Researchers worm their way into broken cache-filling microcode in most Macs and iPads. The post Researchers worm their way into broken cache-f… First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/apple-m-gofetch-richixbw/
-
New SSH-Snake Worm-Like Tool Threatens Network Security
by
in SecurityNewsThe Sysdig Threat Research Team (TRT) discovered that a threat actor is leveraging an open-source network mapping tool called SSH-Snake for malicious … First seen on securityboulevard.com Jump to article: securityboulevard.com/2024/03/new-ssh-snake-worm-like-tool-threatens-network-security/
-
Zero-Click GenAI Worm Spreads Malware, Poisoning Models
by
in SecurityNewsFirst seen on darkreading.com Jump to article: www.darkreading.com/application-security/zero-click-genai-worm-malware-poisoning-models
-
Self-Propagating Worm Created to Target Generative AI Systems
by
in SecurityNewsFirst seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/worm-created-generative-ai-systems/
-
Researchers Create AI Worms That Can Spread From One System To Another
by
in SecurityNewsFirst seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/35607/Researchers-Create-AI-Worms-That-Can-Spread-From-One-System-To-Another.html
-
AI Worm Developed by Researchers Spreads Automatically Between AI Agents
by
in SecurityNewsResearchers have developed what they claim to be one of the first generative AI worms, named Morris II, capable of autonomously spreading between AI s… First seen on gbhackers.com Jump to article: gbhackers.com/created-ai-worm/