article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

Persistent exploitation of legacy systems One of the most alarming aspects of Ghost ransomware is its focus on legacy IoT and OT environments. Key findings from the advisory The advisory highlights the rapid and efficient attack lifecycle of Ghost ransomware, with some incidents seeing full encryption within a single day.

article thumbnail

10-year-old vulnerability in Avaya VoIP Phones finally fixed

Security Affairs

The vulnerability, tracked as CVE-2009-0692 , could be exploited by an attacker to crash the ISC DHCP client and execute arbitrary code with the permissions of the client. Avaya did not address the vulnerability issue in some of its VoIP devices by applying the necessary patches that were released after the discovery of the flaw in 2009.

Firmware 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Who and What is Behind the Malware Proxy Service SocksEscort?

Krebs on Security

SocksEscort began in 2009 as “ super-socks[.]com According to cyber intelligence firm Intel 471 , the very first “SSC” identity registered on the cybercrime forums happened in 2009 at the Russian language hacker community Antichat , where SSC registered using the email address adriman@gmail.com.

Malware 236
article thumbnail

Easily Exploitable Linux Flaw Exposes All Distributions: Qualys

eSecurity Planet

The vulnerability, tracked as CVE-2021-4034 , has “been hiding in plain sight” for more than 12 years and infects all versions of polkit’s pkexec since it was first developed in 2009, Bharat Jogi, director of vulnerability and threat research at Qualys, wrote in a blog post.

article thumbnail

EP 31: Stopping the Mirai IoT Botnet, One CnC Server At A Time

ForAllSecure

In 2016, the Mirai IoT botnet shut down part of the internet, yet variations still plague us today. Maybe our current approach to IoT botnets isn’t working? They spoke at BlackHat USA 2021 where they launched a new tool to find IoT based CnC servers. Clearly, there needs to be another approach. Davanian: This is Ali.

IoT 52
article thumbnail

Telehealth: A New Frontier in Medicine—and Security

SecureList

Number of data leaks from medical organizations, 2009–2020. The MQTT protocol is very convenient to use for devices that belong to the Internet of Things (IoT), and, therefore, it can be found not just in wearable devices but in almost any smart gadget. The HIPAA Journal , which is focused on leaks in the U.S. Source: HIPAA Journal.

Phishing 145
article thumbnail

Shodan: Cybersecurity Tool or Hacker’s Yellow Pages?

Adam Levin

Shodan doesn’t help provide much in the way of reassurance by featuring the top three searches on the site: all are links to vulnerable or unprotected internet-enabled cameras.