article thumbnail

Ransomware operators target CVE-2020-14882 WebLogic flaw

Security Affairs

At least one ransomware operator appears to have exploited the recently patched CVE-2020-14882 vulnerability affecting Oracle WebLogic. At least one ransomware operator appears is exploiting the recently patched CVE-2020-14882 vulnerability in Oracle WebLogic. 30th) attempting to install crypto-mining tools.”

article thumbnail

New Redis miner Migo uses novel system weakening techniques

Security Affairs

A new malware campaign targets Redis servers to deploy the mining crypto miner Migo on compromised Linux hosts. One of the honeypots used by Cado was targeted by an attack originating from the IP 103[.]79[.]118[.]221 Caro Security researchers have observed a new malware campaign targeting Redis servers with a crypto miner dubbed Migo.

Mining 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Log4j Vulnerability Aftermath

Security Affairs

Uptycs researchers have observed attacks related to miners, DDOS malware and some variants of ransomware actively leveraging LogforShell flaw in log4j. So far we have observed attacks related to coinminers, DDOS malware and some variants of ransomware actively leveraging this vulnerability. Coinminers.

article thumbnail

Microsoft warns of more disruptive BlueKeep attacks and urges patch installation

Security Affairs

The popular expert Kevin Beaumont observed some of its EternalPot RDP honeypots crashing after being attacked. huh, the EternalPot RDP honeypots have all started BSOD'ing recently. ” A new wave of attacks could exploit the vulnerability to spread more dangerous and destructive malware, like ransomware or spyware. .

article thumbnail

Australian Govt agency ACSC warns of Emotet and BlueKeep attacks

Security Affairs

. “The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), with its state and territory partners, is continuing to respond to the widespread malware campaign known as Emotet while responding to reports that hackers are exploiting the BlueKeep vulnerability to mine cryptocurrency.” They only expose port 3389.

article thumbnail

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

Spirent refers to this as “data breach emulation,’’ something David DeSanto, Spirent’s threat research director, told me is designed to give companyies a great advantage; it makes it possible to see precisely how the latest ransomware or crypto mining malware would impact a specific network, with all of its quirky complexity.

article thumbnail

Top Deception Tools for 2022

eSecurity Planet

It identifies unauthorized queries attempting to mine AD for data, hides sensitive or privileged AD query results (such as AD domain admins, domain controllers, SPNs, and others), and inserts fake results that point to decoy systems. It can find signs of ransomware, even in encrypted files. Key Differentiators.

Cloud 118