$type=slider$show=home$snippet=hide$cate=0$h=500$va=0$rm=0

Mess of vulnerabilities expose Windows, Linux servers to attack

A cryptomining malware that exploits over twenty known vulnerabilities has been dubbed the “King of Vulnerability Exploitation” by cyberse...

A cryptomining malware that exploits over twenty known vulnerabilities has been dubbed the “King of Vulnerability Exploitation” by cybersecurity experts.

According to researchers at Chinese technology giant Tencent, the HolesWarm cryptomining malware, which targets both Windows and Linux servers, has been able to compromise over a thousand cloud hosts since June.

Deciphering Tencent’s Chinese advisory, Threatpost says the researchers have advised both the government and corporate sector to patch the vulnerabilities exploited by HolesWarm without delay.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

“Tencent security experts recommend that the operation and maintenance personnel of government and enterprise organizations actively repair high-risk vulnerabilities in related network components to avoid servers [becoming] a broiler controlled by hackers,” states the advisory.

'Inexcusable'

Based on their analysis, the researchers note that the malware exploits well-known vulnerabilities in several software commonly found on servers, such as Apache Tomcat, Jenkins, Shiro, Spring boot, Structs2, Weblogic, and more.

Once it has broken into a server, it absorbs it to its botnet, which mines for the Monero cryptocurrency. In addition to the cryptomining activity, the researchers suggest the malware also scoops stored credentials and gives backdoor access to the compromised server to the threat actors.

Yaniv Bar-Dayan, CEO of security company Vulcan Cyber, told Threatpost that leaving unpatched vulnerabilities in internet-exposed servers is “inexcusable”.

“Organizations with exploitable known vulnerabilities should feel lucky if the worst that happens to their digital estate is a HolesWarm cryptominer deployment,” she said.

Via Threatpost



from TechRadar - All the latest technology news https://ift.tt/3j16X3v
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3855,Business,148,Camera,1154,Earn $$$,1,Gadgets,1739,Games,924,Innovations,1,Mobile,1695,Paid Promotions,3,Promotions,3,Technology,7934,Trailers,795,Travel,36,Trendly News,20969,Video,4,XIAOMI,12,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Mess of vulnerabilities expose Windows, Linux servers to attack
Mess of vulnerabilities expose Windows, Linux servers to attack
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2021/08/mess-of-vulnerabilities-expose-windows.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2021/08/mess-of-vulnerabilities-expose-windows.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy