Remove Education Remove File names Remove Military Remove Security
article thumbnail

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Security Affairs

This tool modifies a JavaScript constraints file and executes it with SYSTEM-level permissions. Microsoft has observed APT28 using GooseEgg in post-compromise activities against various targets, including government, non-governmental, education, and transportation sector organizations in Ukraine, Western Europe, and North America.

Military 114
article thumbnail

WinRAR CVE-2018-20250 flaw exploited in multiple campaigns

Security Affairs

Later, security experts from McAfee reported that attackers are continuing in exploiting the WinRAR flaw, they identified more than “100 unique exploits and counting” in the first week since the vulnerability was publicly disclosed. The post WinRAR CVE-2018-20250 flaw exploited in multiple campaigns appeared first on Security Affairs.