![]() ![]() ![]() It is also known under the name "Follina," exists when MSDT is called using the URL protocol from an application, such as Microsoft Office, Microsoft Word or via an RTF file. The reserachers detailed in the article how this malware leverages vulnerabilities and examines its behavior once inside an infected device.įortinet Intel Name: Follina_zero-day_vulnerability_in_Microsoft_Office_getting_exploited Date of Scan: Impact: HIGH Summary:Ī recently discovered zero-day vulnerability CVE-2022-30190 in the Microsoft Windows Support Diagnostic Tool (MSDT) made headlines over the past few days. It also communicates with its command-and-control server using the WebSocket protocol. This botnet, known as Zerobot, contains several modules, including self-replication, attacks for different protocols, and self-propagation. Recently FortiGuard Labsteam observed a new botnet written in the Go language being distributed through IoT vulnerabilities and categorized it as critical. Most of its code base comes from Apostle, Agrius’s previous wiper. Recently group deployed a new wiper named Fantasy. Intel Source: WeliveSecurity Intel Name: A_new_Agrius_threat_group_wiper_Fantasy Date of Scan: Impact: MEDIUM Summary:Īgrius is a new Iranian group targeting victims in Israel and the United Arab Emirates since 2020. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |