Connect with us
Cryptominers and DDoS Botnets Already Exploit OMIGOD Vulnerability Cryptominers and DDoS Botnets Already Exploit OMIGOD Vulnerability

Security

Cryptominers and DDoS Botnets Already Exploit OMIGOD Vulnerability

Published

on

The attacks began on September 16 after the PoC code for the vulnerability was posted on GitHub.

Cryptominer and DDoS botnet operators are actively scanning the Internet for unsecured Azure Linux servers vulnerable to the recently disclosed OMIGOD problem.

OMIGOD is a set of vulnerabilities (CVE-2021-38645b, CVE-2021-38647, CVE-2021-38648, CVE-2021-38649) affecting the Open Management Infrastructure (OMI) application installed by default by Microsoft on most Azure Linux VMs … The application works as a Linux alternative to the Windows Management Infrastructure (WMI) service.

OMIGOD issues have been fixed in OMI version 1.6.8.1 however, there is no automatic update mechanism in the application, so most Azure Linux VMs must be manually updated.

The attacks began on September 16, after GitHub was published demo exploit for the vulnerability. According to companies Bad packets and GreyNoise scanning is carried out from more than 100 servers. In particular, the attackers were interested in servers vulnerable to CVE-2021-38647, which allows them to take control of an Azure Linux server using a malicious OMI package.

According to Shodan, there are currently more than 15,000 Azure Linux servers on the Web.

According to information security experts Kevin Beaumont (Kevin Beaumont) and Herman Fernandez (German Fernandez), cybercriminals deploy cryptocurrency mining programs on compromised servers, or hacked devices become part of a botnet. Some of the attacks are behind a Mirai-based botnet, Fernandez said.

Click to comment

Leave a Reply

Your email address will not be published.

Security

17-year-old hacker who allegedly leaked GTA 6 gameplay videos online arrested in UK

Published

on

17 year old hacker who allegedly leaked GTA 6 gameplay videos online

London police today announced the capture of a 17-year-old teenager suspected of cybercrime in Oxfordshire. At the moment, it is only reported that the arrested person is in custody.

17-year-old hacker who allegedly leaked GTA 6 gameplay videos online arrested in UK

The police declined to say what caused the arrest, but a number of facts indicate that this particular teenager, associated with the Lapsus$ hacker group, previously hacked into Uber, and recently posted screenshots and videos of GTA 6 gameplay on the Web.

In March, Bloomberg wrote that the person believed to be behind several major network hacks was a 16-year-old teenager whose home is in Oxfordshire. Uber wrote on its blog after the hack: “We believe this attacker (or attackers) is associated with a hacker group called Lapsus$, which is becoming more and more active.” A hacker who posted a GTA 6 video online claimed responsibility for the attack on Uber in forum posts.

Recall, yesterday it became known that the FBI joined the investigation into the hacking of Uber and the publication of GTA 6 materials online.

Continue Reading

Gaming

The security specialist was able to “hack” the PS5 through the same vulnerability that he used to jailbreak the PS4

Published

on

The security specialist was able to hack the PS5 through

Security specialist Andy Nguyen was able to bypass the protection of the PS5 game console and “hack” it using an old vulnerability that he also used on the PS4. It concerns the features of the exFAT file system in Sony’s implementation. In 2020, Nguyen managed to jailbreak his PS4 using the same vulnerability. As a result, the specialist received full access to the system core.

The security specialist was able to

The researcher suggested that during the transition from FreeBSD9 to FreeBSD11, the patch that closed the vulnerability somehow stopped working or was removed during the upgrade. The specialist has already reported the vulnerability to the company, which paid him $10,000. The same amount Nguyen received for the same vulnerability on PS4.

The PlayStation hack allows the user to install emulators of other consoles, play pirated versions of games, and also unlock some features that are not normally available to users.

At the same time, Nguyen explained that the error he discovered was just one of a chain of errors required for a full PlayStation 5 jailbreak. To date, the newest console has not been hacked.

Continue Reading

Phones

Only pin code, only hardcore. Locking a smartphone with a fingerprint reduces its security, says Group-IB digital forensics specialist

Published

on

Only pin code only hardcore Locking a smartphone with a

Group-IB digital forensics specialist Igor Mikhailov told the Prime agency why you should not use a fingerprint on your phone.

According to him, locking a smartphone with a fingerprint reduces its security, as the fingerprint can be copied. In addition, it is possible to unlock the gadget with someone else’s fingerprints, especially on devices with an old sensor.

Only pin code, only hardcore.  Locking a smartphone with a fingerprint reduces its security, says Group-IB digital forensics specialist

The most secure way to unlock a smartphone, according to Mikhailov, is to use complex passwords. He advised to turn off the fingerprint login and leave only the pin code.

As for unlocking a smartphone by face, Apple’s Face ID system is the most reliable, but even its enthusiasts managed to deceive with photos and masks of the owners.

Continue Reading

Most Popular