lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

70
active users

#botnet

0 posts0 participants0 posts today

Wow, talk about not understanding the assignment.
Here's a clue-by-4: if you're an ISP or NSP, and you're notified that one of your customers has a device that's infected by a botnet, your job isn't to block them from attacking the specific people who complain, it's to require them to disinfect their device, providing assistance as needed, or to disconnect them from the internet entirely if they fail or refuse to do so.
#infosec #botnet #BlueTeam #SOC

Thousands of #TPLink routers have been infected by a #botnet to spread #malware
According to Cato CTRL team, #Ballista botnet exploits a remote code execution vulnerability that directly impacts TP-Link Archer AX-21 router. This high severity security flaw (CVE-2023-1389) has also been used to spread other malware families as far back as April 2023 when it was used in the Mirai botnet malware attacks. The flaw also linked to the Condi and AndroxGh0st malware attacks.
tomsguide.com/computing/malwar

Tom's Guide · Thousands of TP-Link routers have been infected by a botnet to spread malwareBy Amber Bouman

Oh really it was Ukraine that took down X on March 10? Not so fast.

Independent security researchers found evidence that some X origin servers were not properly secured behind DDoS protection, and researchers noted they did not even see Ukraine in the breakdown of the top 20 IP address origins involved in the attacks. wired.com/story/x-ddos-attack- #X #Musk #DDoS #cyberattack #cybersecurity #security #Ukraine #BotNet #Internet

Should we release PoCs publicly - after they have been fixed? or should we not?

While releasing a PoC is positive for research and awareness, there's no denying it increases the vulnerability's exploitation in the wild.

- CVE-2024-41710 fixed on July 17, 2024
- Two weeks later: PoC published on Github
- Jan 2025: Aquabot v3 noticed "using a payload almost identical to the PoC"

Ref: akamai.com/blog/security-resea

#botnet #phone #entreprise #mirai #IoT #CVE-2024-41710

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #52/2024 is out!

It includes the following and much more:

#WhatsApp Wins in Court Vs. NSO

➝ North Korean Hackers Stole $1.34 Billion in #Crypto in 2024

➝ New Mirai-based #Botnet Targeting TP-Link

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

open.substack.com/pub/0x58/p/i

open.substack.com[InfoSec MASHUP] 52/2024WhatsApp Wins in Court Vs. NSO; North Korean Hackers Stole $1.34 Billion in Crypto in 2024; New Mirai-based Botnet Targeting TP-Link;

Most of the mastodon.social #botnet we recently confirmed is still intact.
mastodon.social/@madeindex/113

Only the accounts we all reported were banned, while the others are still active.

The #reports specifically mentioned that they are part of a larger botnet, to no effect.

#Mastodon #software seems to be great at automatically detecting obvious botnets, like the first example while struggling with #AI generated, higher-quality profiles.

@Mastodon