Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @bad_packets
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bad_packets
-
Prikvačeni tweet
Opportunistic scanning activity continues to target Citrix (NetScaler) servers vulnerable to CVE-2019-19781. This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the targeted server.
#threatintelhttps://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Their Citrix server, https://myapps.cuna.org , is still vulnerable to CVE-2019-19781. This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the targeted server (https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/ …).https://twitter.com/zackwhittaker/status/1225093844162752512 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DDoS malware payload remains active. Exploit attempts ongoing.
#threatintelhttps://twitter.com/bad_packets/status/1222784829332131840 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daily Top 10 Countries – Feb. 4, 2020 New unique Mirai-like (DDoS malware) hosts detected by country:
China: 229
Taiwan: 175
Vietnam: 151
Egypt: 60
Brazil: 53
Russia: 51
Hong Kong: 42
Mexico: 34
Turkey: 34
United States: 33https://mirai.badpackets.net/?source_ip_address=&autonomous_system=&country=&asn=&first_seen__gt=2020-02-04&first_seen__lt=2020-02-05 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bad Packets Report proslijedio/la je Tweet
It's true and for that very reason. To see what
@ASERTResearch does with these scans check out our blog that went live today. http://www.netscout.link/60181ghdp https://twitter.com/bad_packets/status/1224738365737553920 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
.
@NETSCOUT is scanning the internet for Jenkins servers vulnerable to CVE-2020-2100. Jenkins 2.218 (LTS 2.204.1) and earlier are vulnerable to UDP amplification/reflection denial of service attacks.#threatintelhttps://jenkins.io/security/advisory/2020-01-29/#SECURITY-1641 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
𝗪𝗔𝗥𝗡𝗜𝗡𝗚
Mass scanning activity detected from 185.220.101.28 (
Tor exit node) attempting to exploit Fortinet VPN servers vulnerable to unauthenticated arbitrary file read (CVE-2018-13379) leading to disclosure of usernames and passwords in plaintext. #threatintelpic.twitter.com/abozkUFQZz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bad Packets Report proslijedio/la je Tweet
𝗔𝗟𝗘𝗥𝗧
Active DDoS botnet C2 server detected!
IP address: 205.134.182.116 (
)
Hosting provider: AiNET (AS6405)
C2 ports:
120/tcp
1028/tcp
ftp://205.134.182.116/ #opendir Payload: Heartless~Security.*(https://www.virustotal.com/gui/file/64e3bed6d22343004cb8ba2b0f8efe4a8e5c9c7c6c722089d5b41aa04a08ec75/detection …)#malware#threatintelpic.twitter.com/C28hXkrhZ2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Active DDoS malware payload detected: http://173.242.143.112:43613/Mozi.m (https://www.virustotal.com/gui/file/d546509ab6670f9ff31783ed72875dfc0f37fa2b666bd5870eecaaed2ebea4a8/detection …) Exploit attempt source IP: 173.242.143.112 (
)
Target: Netgear router unauthenticated remote command injection vulnerability (https://kb.cert.org/vuls/id/582384/ )
#threatintelpic.twitter.com/AYYoXcFwsM
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
𝗔𝗟𝗘𝗥𝗧
Active DDoS botnet C2 server detected!
IP address: 205.134.182.116 (
)
Hosting provider: AiNET (AS6405)
C2 ports:
120/tcp
1028/tcp
ftp://205.134.182.116/ #opendir Payload: Heartless~Security.*(https://www.virustotal.com/gui/file/64e3bed6d22343004cb8ba2b0f8efe4a8e5c9c7c6c722089d5b41aa04a08ec75/detection …)#malware#threatintelpic.twitter.com/C28hXkrhZ2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bad Packets Report proslijedio/la je Tweet
Make sure your MSPs are patching your Citrix Gateway servers, as people are absolutely getting ransomware’d via this.https://twitter.com/bad_packets/status/1224481106654715904 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bad Packets Report proslijedio/la je Tweet
Round 2 – CVE-2019-19781 Scan Results Vulnerable Citrix servers detected: 7,133 Our latest vulnerability scan results are freely available for authorized government CERT, ISAC, and law enforcement teams. Submit request here: https://forms.gle/eDf3DXZAv96oosfj6 …
#cybersecurity#threatintelPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
"We've determined that an authentication certificate has expired causing users who have logged out and those that are still logged in to have issue using the service. We're developing a fix to apply a new authentication certificate to the service which will remediate impact."https://twitter.com/MSFT365Status/status/1224336575036870656 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
𝗔𝗟𝗘𝗥𝗧
Active DDoS botnet C2 server detected!
IP address: 207.154.212.220 (
)
Hosting provider: DigitalOcean (AS14061)
C2 ports:
5301/tcp
9545/tcp
http://207.154.212.220/bins/ #opendir Payload: Stanleyy.* (https://www.virustotal.com/gui/file/0bb77341ca8600a0a3abc3cce176a7fb0b2af1b25125bf07e30223040192ef46/detection …)#malware#threatintelpic.twitter.com/IwQhouLJ0H
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The mass exploitation of CVE-2019-7256 by DDoS botnet operators started on January 9th – https://twitter.com/bad_packets/status/1215529757099479040 …https://twitter.com/campuscodi/status/1224042393453854720 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
High volume of mass scanning activity checking for "/.aws/credentials" – uptick started around 2020-02-01T14:28:12Z. Bad Packets research and enterprise customers can query for "AWS Credentials File Scanner" to locate source IPs that are scanning.
#threatintelHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We've detected opportunistic exploit activity targeting this vulnerability. Bad Packets™ tags are now available for our research and enterprise customers.https://twitter.com/DC3VDP/status/1223260093355044865 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Bad Packets Report proslijedio/la je Tweet
Systems patched for Citrix
#CVE-2019-19781 may still be compromised. See@CISAgov's latest Activity Alert at https://go.usa.gov/xdDev for procedures for detecting a compromise.#Cyber#Cybersecurity#InfoSecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mass scanning activity detected from 175.141.143.132 (
) checking for Citrix (NetScaler) servers vulnerable to CVE-2019-19781.
This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the targeted server. #threatintelpic.twitter.com/iUFbGmaWSP
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
High volume of masscan traffic detected from hosts in 92.118.37.0/24 (
) – 2,400+ unique ports scanned (https://pastebin.com/0YjaZjPk ). #threatintelHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
)
Targeted ports:
5269/tcp
8089/tcp
8090/tcp
8291/tcp
9002/tcp

. Head over to the disclosed report to see all the details! Thanks for being
Nitesh