article thumbnail

Cuttlefish malware targets enterprise-grade SOHO routers

Security Affairs

The malicious code can also perform DNS and HTTP hijacking within private IP spaces. “What makes this malware family so insidious is the ability to perform HTTP and DNS hijacking for connections to private IP addresses. The bash script also downloads and executes Cuttlefish. ” concludes the report.

Malware 103
article thumbnail

Godlua backdoor, the first malware that abuses the DNS over HTTPS (DoH)

Security Affairs

The peculiarity of this new piece of malware is the ability to communicate with C2 servers via DNS over HTTPS ( DoH ). The DoH protocol was a new standard proposed in October 2018 and it is currently supported by several publicly available DNS servers. com domain. The second variant. ” reads the analysis published by the experts.

DNS 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts

Security Affairs

Unified Extensible Firmware Interface (UEFI) is a specification that defines the architecture of the platform firmware used for booting the computer hardware and its interface for interaction with the operating system. ” reads the advisory. ” states CERT/CC. . ” states CERT/CC.

Firmware 106
article thumbnail

Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol

SecureList

Written in Go, it is flexible enough to generate binaries compatible with various architectures. After the vulnerability is exploited, a command is executed on the system to download the initial script. The setup process checks the OS type and, depending on that, it downloads the second stage, which is the actual malware implant.

Malware 105
article thumbnail

New Mirai variant appears in the threat landscape

Security Affairs

Upon successful exploitation, the attackers try to download a malicious shell script, which contains further infection behaviors such as downloading and executing Mirai variants and brute-forcers.” “The attacks are still ongoing at the time of this writing. “The attacks are still ongoing at the time of this writing.

Wireless 125
article thumbnail

Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen

Security Affairs

The botnet leverages a robust architecture based on a combination of third-party services, P2P, and Command & Control servers. This architecture was implemented to make the botnet resilient to takedowns by law enforcement and security firms with the support of the vendors of the infected devices.

article thumbnail

Discovery of Simps Botnet Leads To Ties to Keksec Group

Security Affairs

We discovered the Simps Botnet binaries downloaded via shell script sample and Remote Code Execution vulnerability exploits by Gafgyt – detailed in our earlier post. . During the first week of May 2021, the Uptycs’ threat research team detected a shell script and Gafgyt malware downloading Simps binaries from the same C2- 23.95.80[.]200.

DDOS 129