Remove Download Remove Information Security Remove Security Intelligence
article thumbnail

North Korea-linked APT Emerald Sleet is using a new tactic

Security Affairs

Upon running the code as an administrator, it downloads and installs a browser-based remote desktop tool and downloads a certificate file with a hardcoded PIN from a remote server. ” states Microsoft Threat Intelligence. . The IT giant recommends training users about phishing and employing attack surface reduction rules.

article thumbnail

A new Mirai botnet variant targets DigiEver DS-2105 Pro DVRs

Security Affairs

In November 2024, the Akamai Security Intelligence Research Team (SIRT) observed increased activity targeting the URI /cgi-bin/cgi_main.cgi , linked to a Mirai-based malware campaign exploiting an unassigned RCE vulnerability in DVR devices, including DigiEver DS-2105 Pro. ” reads the analysis published by Akamai.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Kimsuky APT exploited BlueKeep RDP flaw in attacks against South Korea and Japan

Security Affairs

While investigating a security breach, the AhnLab SEcurity intelligence Center (ASEC) researchers discovered a North Korea-linked group Kimsuky ‘s campaign, tracked as Larva-24005. When opened, they execute PowerShell or Mshta to download malware like PebbleDash and RDP Wrapper, to control the infected systems.

article thumbnail

Kimsuky APT group used custom RDP Wrapper version and forceCopy stealer

Security Affairs

Researchers from AhnLab Security Intelligence Center (ASEC) observed North Korea’s Kimsuky APT group conducting spear-phishing attacks to deliver forceCopy info-stealer malware. When opened, they execute PowerShell or Mshta to download malware like PebbleDash and RDP Wrapper, to control the infected systems.

article thumbnail

Microsoft warns of attacks delivering FlawedAmmyy RAT directly in memory

Security Affairs

The macro included in the documents executes the legitimate msiexec.exe tool that downloads an MSI archive. Anomaly detection helped us uncover a new campaign that employs a complex infection chain to download and run the notorious FlawedAmmyy RAT directly in memory. wsus.exe decrypts and runs the final payload directly in memory.

article thumbnail

Microsoft warns TA505 changed tactic in an ongoing malware campaign

Security Affairs

When opened, the HTML leads to the download Dudear, a malicious macro-laden Excel file that drops the payload. pic.twitter.com/mcRyEBUmQH — Microsoft Security Intelligence (@MsftSecIntel) January 30, 2020. pic.twitter.com/1qnx3NmwiB — Microsoft Security Intelligence (@MsftSecIntel) January 30, 2020.

Malware 104
article thumbnail

SEO poisoning campaign aims at delivering RAT, Microsoft warns

Security Affairs

— Microsoft Security Intelligence (@MsftSecIntel) June 11, 2021. Upon opening the PDF files, users are prompted to download a.doc file or a.pdf version of their desired info. When opened, the PDFs prompt users to download a.doc file or a.pdf version of their desired info.

Antivirus 110