Critical Oracle WebLogic flaw actively exploited to install Cobalt Strike, cryptominers
Over the weekend the researchers detected a campaign, which was using a chain of Powershell obfuscated scripts to download Cobalt Strike.
Over the weekend the researchers detected a campaign, which was using a chain of Powershell obfuscated scripts to download Cobalt Strike.
The Ragnar Locker gang claims to have stolen 2 TB of unencrypted files during the attack and demands a $15 million ransom.
The group combines script-kiddie messages and advanced deployment and targeting techniques in attacks.
The incident involved an unauthorized access carried out by a third party, the company said.
The malware was put up for auction, with a starting price of $6,500.
The malicious code discovered in the tainted Twilio library opened a TCP reverse shell on all machines where the library was downloaded.
The vulnerability is being used to bypass authentication procedures and install a backdoor dubbed SLAPSTICK on internet-exposed Solaris servers.
A separate zero-day bug has been fixed in Chrome for Android.
CVE-2020-14750 is related to another WebLogic vulnerability patched as part of the October 2020 Critical Patch Update, which is already being targeted by cybercriminals.
The penalty only relates to the breach from March 25, 2018, when new rules under the General Data Protection Regulation came into effect.
Showing elements 3401 - 3410