Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

C2

Dark Utilities C2 service draws thousands of cyber criminals

8 August 2022

A platform that makes it easier for cyber criminals to establish command-and-control (C2) servers has already attracted 3,000 users since …

Tags C2, Dark, IT, News, Utilities

Hermit spyware is deployed with the help of a victim’s ISP

29 June 2022

Google’s Threat Analysis Group (TAG) has revealed a sophisticated spyware activity involving ISPs (internet service providers) aiding in …

Tags Android, C2, CVE-2019-8605, iOS, Pegasus

Denonia cryptominer is first malware to target AWS Lambda

11 April 2022

Security researchers at Cado Security, a cybersecurity forensics company, recently discovered the first publicly-known malware targeting …

Tags Business, C2, Cado Security, IT, XMRig

Researchers Uncover New Android Spyware With C2 Server Linked to Turla Hackers

4 April 2022

An Android spyware application has been spotted masquerading as a “Process Manager” service to stealthily siphon sensitive information …

Tags Android, C2, Cyber Threats, Google, Hacking

Duo of Android dropper and payload target certain countries and app users

1 February 2022

After making its first in-the-wild appearance in March 2021, Vultur—an information-stealing RAT that runs on Android—is back. And its …

Tags Android, C2, Duo, Google, Google Play Store

Not with a Bang but a Whisper: The Shift to Stealthy C2

8 December 2021

DoH! Nate Warfield, CTO of Prevailion, discusses new stealth tactics threat actors are using for C2, including Malleable C2 from Cobalt …

Tags C2, Security Pro, Shift, Vulnerability, Web Security

Emotet’s back and it isn’t wasting any time

3 December 2021

Emotet is one of the best known, and most dangerous, malware threats of the past several years. On several occasions it appeared to take an …

Tags C2, GoDaddy, IT, Malware, Trojan

Vidar stealer abuses Mastodon to silently get C2 configuration

7 October 2021

The Vidar stealer has returned in a new campaign that abuses the Mastodon social media network to get C2 configuration without raising …

Tags C2, IT, Mastodon, News

Hotcobalt – Cobalt Strike DoS Vulnerability Allows Blocking C2 Communication

5 August 2021

Recently, a Cobalt Strike DoS vulnerability has been detected by the security analysts at SentinelOne. Cobalt Strike is a legitimate attack …

Tags Blocking, C2, Communications, Security Pro, Vulnerability

Synology C2 Password: Free Password Manager based on AES 256 Encryption

23 July 2021

Synology provided additional information about its new C2 cloud services a month ago, in conjunction to the release of DiskStation Manager …

Tags AES, C2, Encryption, IT, Malware

Malicious Software Infrastructure Easier to Get and Deploy Than Ever

8 January 2021

Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …

Tags C2, Deploy, Get, Malware, Metasploit

Sunburst’s C2 Secrets Reveal Second-Stage SolarWinds Victims

18 December 2020

More information has come to light about the Sunburst backdoor that could help defenders get a better handle on the scope of the sprawling …

Tags C2, Cloud Computing, Cloud Security, Critical Infrastructure, Governments

Magecart Credit-Card Skimmer Adds Telegram as C2 Channel

1 September 2020

The e-commerce card-skimming landscape has a new wrinkle: Cybercriminals affiliated with the Magecart collective are using encrypted …

Tags C2, Channels, Magecart, Malware, Malwarebytes

NSA, FBI Warn of Linux Malware Used in Espionage Attacks

13 August 2020

The U.S. government is warning of new malware, dubbed Drovorub, that targets Linux …

Tags Attacks, C2, Espionage, Linux, OS
Post navigation
Older posts
Page1 Page2 Next →
Cookie-Free

NVD

  • CVE-2022-20276 – In DevicePolicyManager, there is a possible way to determine whether an app is installed, …12 August 2022
  • CVE-2022-20292 – In Settings, there is a possible way to bypass factory reset protections due to a logic er …12 August 2022
  • CVE-2022-20308 – In hostapd, there is a possible insecure configuration due to an insecure default value. T …12 August 2022
  • CVE-2022-20324 – In Framework, there is a possible way to determine whether an app is installed, without qu …12 August 2022
  • CVE-2022-20341 – In ConnectivityService, there is a possible bypass of network permissions due to a missing …12 August 2022
  • CVE-2022-35558 – A stack overflow vulnerability exists in /goform/WifiMacFilterGet in Tenda W6 V1.0.0.9(412 …12 August 2022

EXPLOITS

  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »