Remove Cryptocurrency Remove DDOS Remove Firmware
article thumbnail

DDoS attacks in Q4 2020

SecureList

After the attacks came to light, the manufacturer promptly released a firmware update for configuring verification of incoming requests. While the resource was down, cryptocurrency newbies were invited to download a copy of Bitcoin Core via a torrenting service. In December, Canada’s Laurentian University reported a DDoS attack.

DDOS 145
article thumbnail

Security Affairs newsletter Round 374 by Pierluigi Paganini

Security Affairs

Critical flaw in Netwrix Auditor application allows arbitrary code execution CISA urges to fix multiple critical flaws in Juniper Networks products Threat actors exploit a flaw in Digium Phone Software to target VoIP servers Tainted password-cracking software for industrial systems used to spread P2P Sality bot Experts warn of attacks on sites using (..)

Firmware 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts hacked 28,000 unsecured printers to raise awareness of printer security issues

Security Affairs

Example of available open printers on a single IoT search engine (Shodan.io): As we can see, many users and organizations still use internet-connected devices without thinking about security, installing firmware updates, or taking into account the implications of leaving their devices publicly accessible. Change the default password.

Hacking 145
article thumbnail

IT threat evolution Q1 2022

SecureList

MoonBounce: the dark side of UEFI firmware. Late last year, we became aware of a UEFI firmware-level compromise through logs from our firmware scanner (integrated into Kaspersky products at the start of 2019). The campaign has two goals: gathering information and stealing cryptocurrency. Targeted attacks.

Phishing 134
article thumbnail

QSnatch malware already infected thousands of QNAP NAS devices

Security Affairs

“The original infection method remains unknown, but during that phase malicious code is injected to the firmware of the target system, and the code is then run as part of normal operations within the device. DDoS attack, cryptocurrency miner, data harvesting). ” reads the report. Call-home at specific intervals.

Malware 77
article thumbnail

APT trends report Q2 2022

SecureList

In late 2021, we encountered a malicious DXE driver incorporated into several UEFI firmware images that were flagged by our firmware scanner (integrated into Kaspersky products at the start of 2019). We discovered a highly active campaign, starting in March 2022, targeting stock and cryptocurrency investors in South Korea.

Malware 145
article thumbnail

Security Affairs newsletter Round 341

Security Affairs

U.S. (..)

Banking 77