Remove Data Remove Honeypots Remove Information Security Remove Libraries
article thumbnail

New Go-based Redigo malware targets Redis servers

Security Affairs

The attack chain starts with scans for the Redis server exposing port 6379 to the internet, then threat actors attempt to connect and run the following Redis commands: INFO command – this command allows adversaries to receive information about our Redis server. Attackers loads the library file exp_lin.so to the disk of the replica.

Libraries 142
article thumbnail

Log4Shell was in the wild at least nine days before public disclosure

Security Affairs

Threat actors are already abusing Log4Shell vulnerability in the Log4j library for malicious purposes such as deploying malware. A few hours ago, researchers at NetLab 360 reported that their Anglerfish and Apacket honeypots were already hit by attacks attempting to trigger the Log4Shell flaw in the Log4j library.

Mining 120
article thumbnail

Apache Log4j Zero Day Exploit Puts Large Number of Servers at Severe Risk

eSecurity Planet

We’ve seen similar vulnerabilities exploited before in breaches like the 2017 Equifax data breach.”. The RCE vulnerability – which initially was discovered by the Alibaba Cloud Security Team late last month – affects Log4j versions 2.0-beta9 The Log4j 2 library is very frequently used in enterprise Java software,” they wrote.

Risk 134