mathstodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for maths people. We have LaTeX rendering in the web interface!

Server stats:

2.8K
active users

#unit42

0 posts0 participants0 posts today

A new linux malware, called Auto-Color, was discovered by cybersecurity researchers at Palo Alto Networks' Unit 42, a team specializing in analyzing and uncovering cyber threats. This malware (backdoor) is a tool used by hackers to secretly gain access to computers running the Linux operating system, allowing them to carry out harmful activities while staying hidden.

Auto-Color is designed to be extremely stealthy. For example, it camouflages itself within the system and alters activity logs to make everything appear normal. It’s like an invisible burglar who not only sneaks into your digital “house” but also covers their tracks so you don’t notice their presence. This makes it difficult for security tools to detect and block its actions.

unit42.paloaltonetworks.com/ne

Unit 42 · Auto-Color: An Emerging and Evasive Linux BackdoorBy Alex Armstrong

🚨 Threat Alert! 🚨 Unit 42 reveals a phishing campaign exploiting HubSpot to harvest Microsoft Azure credentials, targeting European companies. With 20,000 users affected, attackers used urgency tactics and fraudulent forms. Stay vigilant! 🔒💻
Learn more about this ongoing threat: cyberinsider.com/threat-actors
#CyberSecurity #Phishing #MicrosoftAzure #HubSpot #Unit42 #newz

CyberInsider · Threat Actors Exploit HubSpot to Harvest Microsoft Azure CredentialsFraudulent forms hosted on HubSpot's Free Form Builder service harvested credentials of 20,000 Microsoft Azure cloud accounts.

Multiple high-profile #opensource projects, including those from #Google, #Microsoft, #AWS, and #RedHat, were found to leak #GitHub authentication tokens through #GitHubActions artifacts in CI/CD.
#PaloAltoNetworks #Unit42 found it affected:
Firebase
OpenSearch Security
Clair
JSON Schemas
TypeScript Repos Automation, TypeScript Bot Test Triggerer, Azure Draft
CycloneDX SBOM (OWASP)
Stockfish
Libevent
Guardian for Apache Kafka
Git Annex
Penrose
Deckhouse
Concrete-ML
bleepingcomputer.com/news/secu

🚨 BREAKING: A highly sophisticated P2P worm named "P2PInfect" is wreaking havoc on Redis instances! 🐛💻 It exploits the critical CVE-2022-0543 vulnerability in the Lua Library with a 10.0 severity score on CVSSv3 scale. Once in, it alters firewalls, granting unrestricted access to operators. 😱

P2PInfect establishes a P2P connection via port 60100 to a large C2 botnet, but no evidence of cryptomining yet. 😮 934 out of 307,000 Redis instances have already fallen victim. 😨

What's scarier? P2PInfect is using Rust, favored by ransomware groups for fast encryption and evading detection. 🦾

🔒 Stay safe! Update your Redis and amp up your cybersecurity practices NOW! 🔒

Source: Unit 42 researchers hackread.com/self-replicating-

Key points:
- The worm, known as P2PInfect, is written in Rust and targets the popular open-source database software Redis.
- It exploits a critical vulnerability (CVE-2022-0543) in the Lua Library, which has a severity score of 10.0 on the CVSSv3 scale.
- Once inside a Redis instance, the worm alters local firewall settings, blocking legitimate access and granting unrestricted access to the worm operators.
- The worm establishes a P2P connection via port 60100 to a large command and control (C2) botnet. There's no evidence yet of P2PInfect engaging in cryptomining using infected instances.
- The worm's rapid spread has been noted, with 934 out of 307,000 publicly-communicating Redis instances identified as vulnerable.
- The use of Rust by P2PInfect is concerning as many ransomware groups have shifted to Rust for its benefits, such as faster encryption and evading common detection methods.
- Organizations and individuals are urged to update their Redis instances and implement robust cybersecurity practices to safeguard against potential attacks.

A highly sophisticated peer-to-peer (P2P) worm named "P2PInfect" has been identified by researchers from Unit 42. It targets instances of the popular open-source database software Redis, exploiting a critical vulnerability known as CVE-2022-0543 in the Lua Library. This vulnerability has received a maximum severity score of 10.0 on the CVSSv3 severity scale. Once inside a Redis instance, the worm establishes a foothold in cloud container environments, alters firewall settings, and grants the operators unrestricted access. P2PInfect employs sophisticated techniques for persistence, ensuring long-term presence on infected systems. It establishes a P2P connection to a large command and control botnet, raising concerns about potential future mining activities.

P2PInfect's use of the Rust programming language is unique and concerning to cybersecurity experts, as it offers benefits such as faster encryption and evading common detection methods. The worm's rapid spread has been observed, and organizations are urged to update their Redis instances and implement robust cybersecurity practices. The cybersecurity community must remain vigilant against emerging threats like P2PInfect and other advanced malware strains.

#P2PInfect
#CybersecurityAlert
#Redis
#RustLang
#CVE20220543
#CyberThreat
#Botnet
#CyberAttack
#InfoSec
#Unit42

HackRead | Latest Cybersecurity and Hacking News SiteALERT: Self-Replicating P2PInfect Worm Hits Redis InstancesTwitter @Hackread - Facebook @ /Hackread
Continued thread

Ding, dong, the CVE is dead! :partyparrot:

The JWT nodejs "vulnerability" from December, popularised at the start of January, has been recognised as a non-issue 🫥

I'm really glad to see it gone. Hoping we get a rash of news stories to follow up on the torrent 🌊 that followed the Unit 42 blog...

I'm not sure if its removal was down to me raising an issue on the GitHub Advisory Database :omya_github: to ask for it to be removed.

#jwt#cve#errata