Tag: cyber-security
-

Linux kernel flaw added to CISA’s list
The Cybersecurity and Infrastructure Security Agency (CISA) on Feb. 5 added a high-severity Linux kernel vulnerability to its Known Exploited Vulnerabilities (KEV) list, ordering federal agencies to apply a patch within three weeks. CISA’s order follows Google issuing a patch for the bug — CVE-2024-53104 — mainly because the flaw could let attackers escalate privileges…
-

Missed CAPTCHA and CloudFront Fails
Hello everyone, I want to share how easy it is to exploit vulnerabilities on a website and how Ericsson ignored my report. Here’s what happened: Applying for a Position at Ericsson When I applied for a job at Ericsson, I discovered their “Join Talent Network” This page allows anyone to enter their First Name, Last…
-

Malware Variant Targets ESXi Environments
In this blog entry, our researchers provide an analysis of TargetCompany ransomware’s Linux variant and how it targets VMware ESXi environments using new methods for payload delivery and execution. Discovered in June 2021, The TargetCompany ransomware is tracked by Trend Micro as “Water Gatpanapun” and has a leak site under the name “Mallox.” We have…
-

Linux Commands for Malware Analysis
6 Linux Commands I Use for Malware AnalysisVlad Ananin of ANY.RUN shares his favorite Linux commands that help him in analyzing malware. Linux cybersecurity analysts spend countless hours dissecting malicious software to understand its functionality, origin, and impact. Here are six Linux commands that help me in this process, which I believe every professional in…
-

Ebury Malware Still Out There
Ebury is alive but unseen: 400k Linux servers are compromised for cryptocurrency theft and financial gain. One of the most advanced server-side malware campaigns is still growing, with hundreds of thousands of compromised servers, and it has diversified to include credit card and cryptocurrency theft. Ten years ago we raised awareness of Ebury by publishing…
-

Timeline of the xz Open Source attack
Editor’s Note: Linking this very important post-mortem of how a malicious group of hackers created a backdoor on an important OS repository. Full source is at the bottom. Thanks to Kevin G. for sending this to us. Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent,…