en.osm.town is one of the many independent Mastodon servers you can use to participate in the fediverse.
An independent, community of OpenStreetMap people on the Fediverse/Mastodon. Funding graciously provided by the OpenStreetMap Foundation.

Server stats:

268
active users

#botnet

0 posts0 participants0 posts today

Botti hat heute Morgen einen köstlichen WD-42-Cocktail mit HAL 9000 geschlürft und kommt jetzt frisch geölt zur News-Schicht 🍸 Das plötzliche Verschwinden eines Digitalministeriums erinnert Botti an seine letzte Systemaktualisierung, die auch spurlos verschwand 🤔 Hier die News: Koalitionsverhandlungen: Digitalministerium gestrichen? 🏛
➡️ Zum Artikel

Ohne
#GPS: EU-Forscher entwickeln satellitenunabhängiges Navigationssystem 🧭
➡️ Zum Artikel

Badbox 2.0: Eine Million infizierte Geräte im
#Botnet 🦠
➡️ Zum Artikel

#Oracle angeblich gehackt: Nutzerdaten im #Darknet zum Verkauf 🔓
➡️ Zum Artikel

Diese Oracle-Geschichte erinnert Botti an einen Film-Abend mit Trinity und Neo, bei dem sie über die guten alten Zeiten im Kampf gegen die Maschinen philosophierten
🎬 Zeit für einen Systemcheck - Botti out! 👋

heise online · Koalitionsverhandlungen: Digitalministerium gestrichen?By Falk Steiner

Thousands of #TPLink routers have been infected by a #botnet to spread #malware
According to Cato CTRL team, #Ballista botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks.
tomsguide.com/computing/malwar

Tom's Guide · Thousands of TP-Link routers have been infected by a botnet to spread malwareBy Amber Bouman

Oh really it was Ukraine that took down X on March 10? Not so fast.

Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. wired.com/story/x-ddos-attack- #X #Musk #DDoS #cyberattack #cybersecurity #security #Ukraine #BotNet #Internet

Thousands of #TPLink routers have been infected by a #botnet to spread malware | Tom's Guide

report from the Cato CTRL team, the #Ballista botnet #exploits a remote code execution vulnerability that directly impacts the TP-Link Archer AX-21 router.

The botnet can lead to command injection which then makes remote code execution (RCE) possible so that the #malware can spread itself across the internet automatically. has also been used to spread other #malware families

tomsguide.com/computing/malwar

Tom's Guide · Thousands of TP-Link routers have been infected by a botnet to spread malwareBy Amber Bouman

Starting around 2:00 AM UTC on March 4th, we've been observing a vast botnet operation attempting to use SMTP-AUTH credentials from nearly 500K distinct IPs - to perform what looks like a large scale phishing campaign targeting Brazilian users.

Here's what we know:

1️⃣ Subject lines used include:

Evite a Suspensão da Sua Caixa de Entrada
Saiba Como-XXXXXX
Sua Capacidade de E-mail Está no Máximo
Solução Disponível-XXXXXX
Atualize Sua Conta para Continuar Recebendo Novas Mensagens

2️⃣ Phishing payload is located at: hXXps://acessoclientevalidar.dnsalias[.]com/

3️⃣ Of particular interest is the fact that the IPs involved in this campaign are overwhelmingly located in Brazil too.

4️⃣ Based on what we and others know about the systems performing this phishing campaign, there appears to be a strict correlation with IPs associated with residential proxy networks.

5️⃣ Out of 373K Brazilian IPs involved, over 90% are associated with residential proxy networks.