article thumbnail

Aqua Nautilus Discovers Redigo — New Redis Backdoor Malware

Aqua Security

Aqua Nautilus discovered new Go based malware that targets Redis servers. The attack was executed against one of our deliberately vulnerable Redis honeypots (CVE-2022-0543). Therefore, the malware received the name Redigo. Therefore, the malware received the name Redigo.

Malware 142
article thumbnail

Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134

Lacework

Details regarding the recent Confluence OGNL ( CVE-2022-26134 ) exploit were released to the public on June 3rd 2022. While this was expected, there appears to be more widespread exploitation of CVE-2022-26134 compared to previous Confluence vulnerabilities. Username first seen in early May with various malware.

Malware 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Kinsing Malware Hides Itself as a Manual Page and Targets Cloud Servers

Tenable

One of the most common cryptomining threats for cloud environments is the Kinsing malware. Kinsing is a notorious malware family active for several years, primarily targeting Linux-based cloud infrastructure. The Kinsing malware uses different locations to stay undetected and hides itself as a system file.

Malware 127
article thumbnail

Malware targeting latest F5 vulnerability

Lacework

On May 9th, 2022 a remote code execution vulnerability in F5’s Big IP suite of appliances under CVE-2022-1388. Hunting for Malware. Lacework Labs has identified from their honeypot data CVE-2022-1388 being exploited. Figure 1 – Example CVE-2022-1388 exploit template. x, 13.1.5, x and 11.6.x x are affected.

Malware 96
article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Tenable

Meanwhile, cybercriminals have amplified their use of malware for fake software-update attacks. That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter. Collectively, they accounted for 77% of the quarter’s malware infections.

article thumbnail

Protestware on the rise: Why developers are sabotaging their own code

TechCrunch

His areas of interest include open source software security, malware analysis, data breaches, and scam investigations. A week into 2022, thousands of applications that rely on the heavily used npm projects colors and faker broke and began printing gibberish text on users’ screens. Contributor. Share on Twitter.

article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). General indicators and signatures for steg malware are provided in the hunting section. Steg malware is uncommon relative to other malware. Malware Details.

Malware 96