article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

Researchers this month uncovered a two-year-old Linux-based remote access trojan dubbed AVrecon that enslaves Internet routers into botnet that bilks online advertisers and performs password-spraying attacks. SocksEscort[.]com com , is what’s known as a “SOCKS Proxy” service. WHO’S BEHIND SOCKSESCORT?

Malware 211
article thumbnail

Threat actors exploit discontinues Boa web servers to target critical infrastructure

Security Affairs

The experts pointed out that Boa has been discontinued since 2005. ” Microsoft experts explained that despite Boa being discontinued in 2005, many vendors across a variety of IoT devices and popular software development kits (SDKs) continue to use it. ” reads the report published by Microsoft. ” concludes the report.

IoT 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2005, Sony BMG delivered millions of CDs with a rootkit that monitored listening habits and unintentionally left a backdoor to the device for cybercriminals. with no internet. Firmware rootkit. Some of the best-known spyware strains include CoolWebSearch, Gator, Internet Optimizer, TIBS Dialer, and Zlob. Rootkit Type.

Malware 104
article thumbnail

Top SD-WAN Solutions for Enterprise Security

eSecurity Planet

Alongside its over 200 acquisitions in four decades, Cisco acquired SD-WAN market innovator Viptela in 2017 to cement its commitment to internet-based networking solutions. Founded in 2005, Palo Alto Networks is a leading network security provider whose reputation extends to its SD-WAN capabilities. Palo Alto Networks.

Firewall 117