Aggregator
Perfectl Malware
Perfectl in an impressive piece of malware:
The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua Security said. It can also exploit CVE-2023-33246, a vulnerability with a severity rating of 10 out of 10 that was patched last year in Apache RocketMQ, a messaging and streaming platform that’s found on many Linux machines.
The researchers are calling the malware Perfctl, the name of a malicious component that surreptitiously mines cryptocurrency. The unknown developers of the malware gave the process a name that combines the perf Linux monitoring tool and ctl, an abbreviation commonly used with command line tools. A signature characteristic of Perfctl is its use of process and file names that are identical or similar to those commonly found in Linux environments. The naming convention is one of the many ways the malware attempts to escape notice of infected users...
The post Perfectl Malware appeared first on Security Boulevard.
CVE-2008-0325 | FaScript FaPersian Petition show.php id sql injection (EDB-4916 / XFDB-39716)
CVE-2008-0326 | FaScript FaPersianHack 1.0 id sql injection (EDB-4917 / XFDB-39717)
CVE-2008-0360 | Blog Cms 4.2.1 C index.php field sql injection (EDB-4919 / BID-27317)
CVE-2008-4548 | Rtssentry 2.1.0.2 ActiveX Control CamPanel.dll second memory corruption (EDB-4918 / XFDB-39725)
CVE-2008-0327 | FaScript FaMp3 1.0 show.php id sql injection (EDB-4914 / XFDB-39714)
CVE-2008-0328 | FaScript FaName 1.0 page.php id sql injection (EDB-4915 / XFDB-39715)
CVE-2008-4586 | Acresso FLEXnet Connect 6.1 ActiveX Control isusweb.dll Remote Code Execution (EDB-4913 / XFDB-45955)
Dutch police dismantled dual dark web market ‘Bohemia/Cannabia’
CVE-2024-8190: как злоумышленник взломал сеть и заперся в ней изнутри
卡西欧称:勒索软件攻击暴露了员工、客户和业务合作伙伴的信息
CVE-2016-1424 | Cisco IOS 15.2(1)T1.11/15.2(2)TST LLDP Packet memory corruption (CSCun63132 / Nessus ID 91761)
Beware of Fake AI Scam calls that Takeover your Gmail Account
Scammers use sophisticated AI technology to impersonate tech giants like Google, aiming to take over unsuspecting users’ Gmail accounts. A recent incident highlights these fraudsters’ cunning tactics, underscoring the need for heightened vigilance. The Initial Contact: A Suspicious Notification The trouble began with an unexpected notification. The user received a prompt to approve a Gmail […]
The post Beware of Fake AI Scam calls that Takeover your Gmail Account appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.