Read all Blogs from this Author
The report by CloudSEK uncovers the resurgence of the Mozi botnet in a new form called "Androxgh0st," actively exploiting vulnerabilities across multiple platforms, including IoT devices and web servers. Since January 2024, Androxgh0st has adopted payloads and tactics from Mozi, allowing it to target systems like Cisco ASA, Atlassian JIRA, and PHP frameworks. This botnet utilizes remote code execution and credential-stealing methods to maintain persistent access, leveraging unpatched vulnerabilities to infiltrate critical infrastructures. Immediate security patches and regular monitoring are advised to mitigate risks from this complex threat, which now combines Mozi’s IoT-targeting abilities with Androxgh0st’s extended attack vector.
As Halloween approaches, online scams targeting eager celebrants are on the rise. Scammers exploit increased spending on costumes, decorations, and events using fake websites, phishing schemes, and counterfeit products. Tactics include fraudulent costume shops, fake charity events, and phishing links that mimic reputable brands. Protect yourself by verifying websites, sticking to trusted retailers, avoiding unsolicited messages, and reporting scams. Stay vigilant to enjoy a safe and scam-free Halloween season.
Read all Whitepapers and reports from this Author
The report "Beyond the Storefront: E-commerce and Retail Threat Insights" highlights the growing cyber threats to the e-commerce and retail sectors, including a surge in ransomware attacks, hacktivist activities, and data breaches. It emphasizes the need for enhanced security measures as these industries face increasing risks from financially motivated attacks and politically driven hacktivism.
Read MoreThe report "MichaMichaBot: Unmasking the Threats Exploiting Missing 'X-Frame-Options' Headers" reveals how cybercriminals exploit this vulnerability to launch phishing attacks by embedding legitimate websites in iframes with fake login panels. It provides insights into these attack methods and practical strategies to secure digital assets against such threats.
Read MoreOur whitepaper, "Unveiling Maorrisbot: The Inner Workings of an Android Trojan Malware," explores the sophisticated methods and impacts of Maorrisbot malware, offering insights and strategies to protect your devices. Download it to learn how to safeguard against this significant Android threat.
Read MoreFraudsters exploit social media to lure investors into fake investment groups, impersonating financial experts & promising high returns. This report exposes their tactics targeting India & global countries.
Read MoreRead all knowledge base articles from this Author