Remove 2017 Remove Information Security Remove Security Intelligence
article thumbnail

Microsoft warns of spam campaign exploiting CVE-2017-11882 flaw

Security Affairs

The spam messages are sent in various European languages, threat actors are exploiting the Microsoft Office and Wordpad CVE-2017-11882 vulnerability. pic.twitter.com/Ac6dYG9vvw — Microsoft Security Intelligence (@MsftSecIntel) June 7, 2019. Windows Defender ATP detects the documents as Exploit:O97M/CVE-2017-11882.AD

article thumbnail

Iran-linked APT is exploiting the Zerologon flaw in attacks

Security Affairs

Microsoft 365 Defender customers can also refer to these detections: [link] — Microsoft Security Intelligence (@MsftSecIntel) October 5, 2020. The first MuddyWater campaign was observed in late 2017 when targeted entities in the Middle East. We strongly recommend patching. ” reads the analysis published by Microsoft.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A long-running cryptomining campaign conducted by 8220 hackers now targets Linux servers

Security Affairs

Microsoft Security Intelligence experts are warning of a long-running campaign conducted by a cloud threat actor group, tracked as 8220, that is now targeting Linux servers to install crypto miners. ” The 8220 group has been active since at least 2017, it focuses on cryptomining campaigns. . Pierluigi Paganini.

article thumbnail

Corona Mirai botnet spreads via AVTECH CCTV zero-day 

Security Affairs

Akamai’s Security Intelligence and Response Team (SIRT) has detected a botnet campaign exploiting multiple previously known vulnerabilities and a newly discovered zero-day, tracked as CVE-2024-7029 (CVSS score: 8.7), in AVTECH CCTV cameras. .” The bot also targets AVTECH issues , a Hadoop YARN RCE , and CVE-2014-8361.

Firmware 133
article thumbnail

Microsoft disrupts SEABORGIUM ’s ongoing phishing operations

Security Affairs

More details + TTPs in this MSTIC blog: [link] — Microsoft Security Intelligence (@MsftSecIntel) August 15, 2022. SEABORGIUM has been active since at least 2017, its campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft.

Phishing 105
article thumbnail

Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine

Security Affairs

Get TTPs and protection info: [link] — Microsoft Security Intelligence (@MsftSecIntel) October 14, 2022. The group is also the author of the NotPetya ransomware that hit hundreds of companies worldwide in June 2017, causing billions worth of damage.

article thumbnail

UK NCSC warns of spear-phishing attacks from Russia-linked and Iran-linked groups

Security Affairs

The UK agency reported ongoing spear-phishing campaigns carried out by Russia-based group SEABORGIUM and Iran-based group TA453 to gather intelligence on the victims. SEABORGIUM has been active since at least 2017, its campaigns involve persistent phishing and credential theft campaigns leading to intrusions and data theft.