101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

508
active users

#sprysocks

0 posts0 participants0 posts today
bojkotiMalbona<p>Linux backdoor is a Windows malware knockoff: <a href="https://arstechnica.com/security/2023/09/never-before-seen-linux-backdoor-is-a-windows-malware-knockoff/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2023/</span><span class="invisible">09/never-before-seen-linux-backdoor-is-a-windows-malware-knockoff/</span></a></p><p>.<a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/SprySOCKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SprySOCKS</span></a> <a href="https://infosec.exchange/tags/Trochilus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trochilus</span></a> <a href="https://infosec.exchange/tags/APT10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT10</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> list of resources for week #38/2023 is out! It includes the following and much more:</p><p>➝ 🔓 ❌ TransUnion Denies <a href="https://infosec.exchange/tags/Breach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Breach</span></a> After Hacker Publishes Allegedly Stolen Data<br>➝ 🔓 ⚖️ Hackers breached International Criminal Court’s systems last week<br>➝ 🔓 🤖 <a href="https://infosec.exchange/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> researchers accidentally exposed terabytes of internal sensitive data<br>➝ 🦠 💸 <a href="https://infosec.exchange/tags/BlackCat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlackCat</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> hits <a href="https://infosec.exchange/tags/Azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Azure</span></a> Storage with <a href="https://infosec.exchange/tags/Sphynx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sphynx</span></a> encryptor<br>➝ 🇮🇷 🇮🇱 Iranian Nation-State Actor OilRig Targets Israeli Organizations<br>➝ 🇮🇳 <a href="https://infosec.exchange/tags/India" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>India</span></a>'s biggest tech centers named as <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> hotspots<br>➝ 🇫🇮 💊 Finnish Authorities Dismantle Notorious <a href="https://infosec.exchange/tags/PIILOPUOTI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PIILOPUOTI</span></a> Dark Web Drug Marketplace<br>➝ 🇨🇦 🇷🇺 Canadian Government Targeted With <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> Attacks by Pro-<a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> Group<br>➝ 🇨🇳 🇺🇸 <a href="https://infosec.exchange/tags/China" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>China</span></a> Accuses U.S. of Decade-Long <a href="https://infosec.exchange/tags/Cyberespionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberespionage</span></a> Campaign Against <a href="https://infosec.exchange/tags/Huawei" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Huawei</span></a> Servers<br>➝ 🇺🇸 🇨🇳 China's Malicious Cyber Activity Informing War Preparations, <a href="https://infosec.exchange/tags/Pentagon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentagon</span></a> Says<br>➝ 🇨🇳 🦠 New <a href="https://infosec.exchange/tags/SprySOCKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SprySOCKS</span></a> Linux <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> used in cyber espionage attacks<br>➝ 🇬🇧 🔐 UK Minister Warns <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meta</span></a> Over End-to-End Encryption<br>➝ 🇺🇸 🇷🇺 One of the <a href="https://infosec.exchange/tags/FBI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FBI</span></a>’s most wanted hackers is trolling the U.S. government<br>➝ 🦠 🥸 Fake <a href="https://infosec.exchange/tags/WinRAR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinRAR</span></a> proof-of-concept exploit drops <a href="https://infosec.exchange/tags/VenomRAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VenomRAT</span></a> malware<br>➝ 🦠 📈 <a href="https://infosec.exchange/tags/P2PInfect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>P2PInfect</span></a> botnet activity surges 600x with stealthier malware variants<br>➝ 🦠 📡 Hackers backdoor <a href="https://infosec.exchange/tags/telecom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>telecom</span></a> providers with new HTTPSnoop malware<br>➝ 🦠 🐝 <a href="https://infosec.exchange/tags/Bumblebee" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bumblebee</span></a> malware returns in new attacks abusing <a href="https://infosec.exchange/tags/WebDAV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebDAV</span></a> folders<br>➝ 🔐 <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> launches <a href="https://infosec.exchange/tags/passkey" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>passkey</span></a> support into general availability<br>➝ ☑️ 🐧 Free Download Manager releases script to check for <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> malware<br>➝ 💬 🔐 <a href="https://infosec.exchange/tags/Signal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Signal</span></a> adds quantum-resistant encryption to its <a href="https://infosec.exchange/tags/E2EE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>E2EE</span></a> messaging protocol<br>➝ 🍏 🔐 <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> 17 includes these new security and <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> features<br>➝ 🩹 High-Severity Flaws Uncovered in <a href="https://infosec.exchange/tags/Atlassian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Atlassian</span></a> Products and ISC BIND Server<br>➝ 🩹 😡 Incomplete disclosures by <a href="https://infosec.exchange/tags/Apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apple</span></a> and <a href="https://infosec.exchange/tags/Google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Google</span></a> create “huge blindspot” for 0-day hunters<br>➝ 🍏 🩹 Apple emergency updates fix 3 new zero-days exploited in attacks<br>➝ 🩹 <a href="https://infosec.exchange/tags/TrendMicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrendMicro</span></a> fixes <a href="https://infosec.exchange/tags/endpoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>endpoint</span></a> protection zero-day used in attacks<br>➝ 🩹 <a href="https://infosec.exchange/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> Patches High-Severity <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> in FortiOS, FortiProxy, FortiWeb Products<br>➝ 🔓 Nearly 12,000 <a href="https://infosec.exchange/tags/Juniper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Juniper</span></a> <a href="https://infosec.exchange/tags/Firewalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firewalls</span></a> Found Vulnerable to Recently Disclosed RCE Vulnerability</p> <p>📚 This week's recommended reading is: "Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It" by Marc Goodman</p> <p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-week-382023" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-week-382023</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Earth Lusca's New Linux Backdoor: SprySOCKS Unveiled! 🐙"</p><p>Earth Lusca, a China-linked threat actor, has been spotted employing a novel Linux backdoor, dubbed "SprySOCKS". This malware seems to have evolved from the open-source Windows backdoor Trochilus. The backdoor showcases swift behavior and a SOCKS implementation, hence the name. 🐍💼</p><p>SprySOCKS's structure is reminiscent of the RedLeaves backdoor, a RAT known to infect Windows machines. This backdoor is still under development, with different versions observed. Its interactive shell seems to draw inspiration from the Linux variant of the Derusbi malware. 🕵️‍♂️🔍</p><p>Recent activities of Earth Lusca indicate a focus on Southeast Asia, Central Asia, and the Balkans. Their primary targets? Government departments in foreign affairs, technology, and telecommunications. They've been exploiting server-based N-day vulnerabilities, including CVE-2022-40684, CVE-2022-39952, and more. Once inside, they deploy Cobalt Strike for lateral movement, aiming to exfiltrate sensitive data and conduct long-term espionage. 🌍🎯</p><p>Source: <a href="https://www.trendmicro.com/en_us/research/23/i/earth-lusca-employs-new-linux-backdoor.html" rel="nofollow noopener" target="_blank">Trend Micro Research</a></p><p>Tags: <a href="https://infosec.exchange/tags/EarthLusca" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EarthLusca</span></a> <a href="https://infosec.exchange/tags/SprySOCKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SprySOCKS</span></a> <a href="https://infosec.exchange/tags/LinuxBackdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxBackdoor</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/RedLeaves" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedLeaves</span></a> <a href="https://infosec.exchange/tags/Trochilus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trochilus</span></a> <a href="https://infosec.exchange/tags/CobaltStrike" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CobaltStrike</span></a> 🌐🔐🖥️</p>