article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. “To steal this metadata, the malware queries internal MySQL databases used by the Softswitch.”

Metadata 363
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. “To steal this metadata, the malware queries internal MySQL databases used by the Softswitch.”

Metadata 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leveraging Metadata for Enhanced Information Governance 

Gimmal

Enter metadata—a powerful tool that can revolutionize your information governance strategy. Limited Sorting and Filtering : Users can only sort and filter files based on basic attributes like name and date within a folder, restricting efficient data retrieval. The Power of Metadata So, what is metadata?

article thumbnail

Digitizing Records: Understanding Metadata Requirements

National Archives Records Express

S49-07-001 – STS-049 – In cabin view of crewmember at the forward flight deck with laptop terminal National Archives Identifier: 22702275 In this blog post, we will explore the key aspects of metadata requirements and their significance in recordkeeping.

Metadata 109
article thumbnail

Fake Falcon crash reporter installer used to target German Crowdstrike users

Security Affairs

The spear-phishing page included a download link pointing to a ZIP archive file that contained a malicious InnoSetup installer. The installer injected the executable into a JavaScript file named “jquery-3.7.1.min.js” While the final payload has not been recovered, metadata from these files has been obtained.

Passwords 359
article thumbnail

Microsoft Vancouver leaking website credentials via overlooked DS_STORE file

Security Affairs

CyberNews researchers discovered a Desktop Services Store (DS_STORE) file left on a publicly accessible web server that belongs to Microsoft Vancouver. What’s the danger of leaving DS_STORE files on web servers? This DS_STORE file is also invisible. “As Original post @ [link]. DS_Store to see what information comes up.”

Passwords 277
article thumbnail

Evilnum APT used Python-based RAT PyVil in recent attacks

Security Affairs

When the LNK file is executed, a JavaScript file is called, which acts only as a first-stage dropper (the file name is ddpp.exe). When comparing the malware executable with the original Oracle executable, we can see the similar metadata between the files.

Phishing 363