article thumbnail

Tainted password-cracking software for industrial systems used to spread P2P Sality bot

Security Affairs

Dragos researchers were also able to recover the password using the exploit over Ethernet, significantly increasing the severity of the flaw, tracked as CVE-2022-2003. The CVE-2022-2003 was responsibly disclosed to Automation Direct and the vendor addressed it with the release of a firmware update.

Passwords 106
article thumbnail

Who Wants to Support My Work Commercially?

Security Boulevard

Folks, Who wants to dive deep into some of my latest commercially available research and stay on the top of their OSINT/cybercrime research and threat intelligence gathering game that also includes their team and organization? Astalavista Security Newsletter - 2003-2006 - Full Offline Reading Copy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Affairs newsletter Round 283

Security Affairs

Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

IoT 101
article thumbnail

ZombieBoy, a new Monero miner that allows to earn $1,000 on a monthly basis

Security Affairs

Unlike MassMiner cryptocurrency miner, ZombieBoy leverages WinEggDrop instead of MassScan to search for new hosts to infect. The cryptocurrency uses Simplified Chinese language, which suggests that its author is a Chinese coder. CVE-2017-0143 , SMB exploit.

article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

In 2003, one of the first pieces of malware designed to make money was discovered. The advent of untraceable digital payment methods like cryptocurrency was a boon to hackers looking to extort as much money as they could from their targets without being caught. It later evolved to also include file encryption.

Malware 140