article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. “To steal this metadata, the malware queries internal MySQL databases used by the Softswitch.”

Metadata 363
article thumbnail

Crooks hide e-skimmer code in favicon EXIF Metadata

Security Affairs

Malwarebytes experts observed crooks hiding a software skimmer in the EXIF metadata of an image that was surreptitiously loaded by compromised online stores. While investigating a Magecart attack, experts found an e-skimmer code hidden in the EXIF metadata of an image file and surreptitiously loaded by compromised online stores.

Metadata 327
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A flaw in the W3 Total Cache plugin exposes hundreds of thousands of WordPress sites to attacks

Security Affairs

A WordPress W3 Total Cache plugin vulnerability could allow attackers to access information from internal services, including metadata on cloud-based apps. in the WordPress W3 Total Cache plugin could expose metadata from internal services and cloud apps. A severe vulnerability, tracked as CVE-2024-12365 (CVSS score of 8.5)

Metadata 309
article thumbnail

Linux Malware Targets VoIP Networks to Steal Metadata

Data Breach Today

CDRThief' Malware Appears Designed for Espionage or Fraud A recently uncovered Linux malware variant dubbed "CDRThief" is targeting VoIP networks to steal phone metadata, such as caller IP addresses, ESET reports. The malware appears to be designed for cyberespionage or fraud.

Metadata 334
article thumbnail

What is Metadata and Why is it Important?

AIIM

One such tool is Metadata. Metadata offers significant benefits in terms of understanding information in new ways and in being able to leverage that intelligence to drive innovation and the customer experience. What is Metadata? The US Department of Defense has a definition of metadata in its DoD 5015.2

Metadata 260
article thumbnail

How to Develop a Metadata Strategy

AIIM

What’s the Importance of a Metadata Strategy? Many organizations use metadata in ways that provide significant business value. Every system uses metadata to store and retrieve data. To avoid this, organizations should develop a metadata strategy. How to Identify Metadata. Three Steps to Determine Metadata.

Metadata 225
article thumbnail

Unsecured Database Leaves 8.4TB of Email Metadata Exposed

Data Breach Today

Shanghai Jiao Tong University Has Since Locked-Down Elasticsearch Server A security researcher found an unsecured database belonging to the Shanghai Jiao Tong University in China that contained 8.4TB of email metadata.

Metadata 276