Patched more than a year ago Drupalgeddon2 flaw is still being actively exploited by hackers
The new campaign exploits the vulnerability through a .GIF file that contains a malicious code.
The new campaign exploits the vulnerability through a .GIF file that contains a malicious code.
The malware doesn’t carry out man-in-the-middle attacks, it infects the browser itself.
The PKPLUG group has been using a variety of malware in a series of espionage campaigns across Southeast Asia since at least 2013.
The Geost botnet infected more than 800,000 Android devices and potentially accessed several millions Euros in the bank accounts of the victims.
The malware is distributed via a malspam campaign with the spam messages containing malicious attachments or URL redirecting to malicious payloads.
The recent eGobbler campaign expanded its targeting to desktop browsers and users in European countries.
An initial foothold into victims’ systems is achieved with the help of modified version of the open-source PcShare backdoor, specifically tailored to the needs of the campaign.
The Nodersok malware turns infected machines into proxies.
The group sets its sights on commercial routers behind public WiFi networks.
The campaign showed several changes in the APT’s approach, including an improved downloader written in the Nim language, and a backdoor rewritten in from Delphi into Golang.
Showing elements 3891 - 3900