article thumbnail

Multiple threat actors exploit PHP flaw CVE-2024-4577 to deliver malware

Security Affairs

Multiple threat actors exploit a recently disclosed security PHP flaw CVE-2024-4577 to deliver multiple malware families. The flaw CVE-2024-4577 (CVSS score: 9.8) Greynoise researchers also reported malicious attempts of exploitation of the CVE-2024-4577. “As ” reported Akamai. . ” reported Akamai.

Honeypots 349
article thumbnail

Patch Tuesday, June 2024 “Recall” Edition

Krebs on Security

Security experts roundly trashed Recall as a fancy keylogger, noting that it would be a gold mine of information for attackers if the user’s PC was compromised with malware. CVE-2024-30080 is a flaw in the Microsoft Message Queuing (MSMQ) service that can allow attackers to execute code of their choosing. 10 is the worst). .

Mining 284
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors exploit Atlassian Confluence bug in cryptomining campaigns

Security Affairs

Threat actors are actively exploiting a critical flaw in the Atlassian Confluence Data Center and Confluence Server in cryptocurrency mining campaigns. The company addressed the vulnerability in January 2024 with the release of versions 8.5.4 (LTS), The critical vulnerability CVE-2023-22527 (CVSS score 10.0) Data Center only).

Mining 345
article thumbnail

How Cryptocurrency Turns to Cash in Russian Banks

Krebs on Security

” Russian President Vladimir Putin in August signed a new law legalizing cryptocurrency mining and allowing the use of cryptocurrency for international payments. firms , including an entity created in February 2024 called Globopay UAB Ltd , and another called WS Management and Advisory Corporation Ltd. ”

article thumbnail

Fake AV websites used to distribute info-stealer malware

Security Affairs

In mid-April 2024, researchers at Trellix Advanced Research Center team spotted multiple fake AV sites used to distribute info-stealers. Threat actors used fake AV websites masquerading as legitimate antivirus products from Avast, Bitdefender, and Malwarebytes to distribute malware. bitdefender-app[.]com malwarebytes[.]pro

Archiving 346
article thumbnail

Russia-linked APT28 and crooks are still using the Moobot botnet

Security Affairs

” During the investigation into a Linux botnet targeted in a partial takedown by the FBI in January 2024, the researchers discovered another Linux botnet running on some of the same EdgeRouters previously exploited by Pawn Storm. ” reported Trend Micro. ” concludes the report.

article thumbnail

Threat actors actively exploit JetBrains TeamCity flaws to deliver malware

Security Affairs

Multiple threat actors are exploiting the recently disclosed JetBrains TeamCity flaw CVE-2024-27198 in attacks in the wild. Trend Micro researchers are exploiting the recently disclosed vulnerabilities CVE-2024-27198 (CVSS score: 9.8) and CVE-2024-27199 (CVSS score 7.3) reads the advisory published by JetBrains.