Remove Architecture Remove Blog Remove Firmware Remove Information Security
article thumbnail

Second-ever UEFI rootkit used in North Korea-themed attacks

Security Affairs

The experts were investigating several suspicious UEFI firmware images when discovered four components, some of which were borrowing the source code a Hacking Team spyware. The firmware malware is based on code associated with HackingTeam’s VectorEDK bootkit, with minor changes. ” concludes the report.

Firmware 132
article thumbnail

A new Mirai botnet variant targets TP-Link Archer A21

Security Affairs

Working exploits for LAN and WAN interface accesses were respectively reported by Team Viettel and Qrious Security. In March, TP-Link released a firmware update to address multiple issues, including this vulnerability. The vulnerability was first reported to ZDI during the Pwn2Own Toronto 2022 event.

DDOS 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

US gov agencies e private firms warn nation-state actors are targeting ICS & SCADA devices

Security Affairs

“The APT actors’ tools have a modular architecture and enable cyber actors to conduct highly automated exploits against targeted devices. . “The APT actors’ tools have a modular architecture and enable cyber actors to conduct highly automated exploits against targeted devices. To nominate, please visit:?

Passwords 118
article thumbnail

Kali Linux 2024.1 Release (Micro Mirror)

Kali Linux

As it turns out, Kenneth operates a network of mirrors, which was officially announced back in May 2023 on his blog: Building the Micro Mirror Free Software CDN. For anyone interested in Internet infrastructure, we encourage you to read it, that’s a well-written blog post right there, waiting for you. Automate it!

Software 145
article thumbnail

Kali Linux 2023.4 Release (Cloud ARM64, Vagrant Hyper-V & Raspberry Pi 5)

Kali Linux

For the time being, the image is for ARM64 architecture, hopefully additional flavors will come later. Much more could be written on the topic, and we plan a longer blog post dedicated to it. If you want our blog posts, and only that, in your inbox, sign up! We have a RSS feeds and newsletter of our blog to help you.

article thumbnail

Lemon Group gang pre-infected 9 million Android devices for fraudulent activities

Security Affairs

The most interesting characteristic of the Triada Trojan apart is its modular architecture, which gives it theoretically a wide range of abilities. Threat actors compromised third-party software or the installation of malware-laced firmware. Please nominate Security Affairs as your favorite blog.

Mobile 91
article thumbnail

Mirai code re-use in Gafgyt

Security Affairs

In this blog, we’ll take a look at some of the re-used Mirai modules , their functionality, and the Uptycs EDR detection capabilities of Gafgyt. Keep systems and firmware updated with the latest releases and patches. The modules are: HTTP flooding UDP flooding TCP flooding STD module Telnet Bruteforce. executes the payload.

Malware 119