Bad Packets Report

@bad_packets

Tweets by Troy Mursch. We provide cyber on emerging threats, DDoS botnets, and network abuse. References:

Vrijeme pridruživanja: travanj 2017.

Tweetovi

Blokirali ste korisnika/cu @bad_packets

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bad_packets

  1. Prikvačeni tweet
    13. sij

    Opportunistic scanning activity continues to target Citrix (NetScaler) servers vulnerable to CVE-2019-19781. This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the targeted server.

    Prikaži ovu nit
    Poništi
  2. prije 2 sata

    Their Citrix server, , is still vulnerable to CVE-2019-19781. This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the targeted server ().

    Poništi
  3. DDoS malware payload remains active. Exploit attempts ongoing.

    Poništi
  4. Daily Top 10 Countries – Feb. 4, 2020 New unique Mirai-like (DDoS malware) hosts detected by country: 🇨🇳 China: 229 🇹🇼 Taiwan: 175 🇻🇳 Vietnam: 151 🇪🇬 Egypt: 60 🇧🇷 Brazil: 53 🇷🇺 Russia: 51 🇭🇰 Hong Kong: 42 🇲🇽 Mexico: 34 🇹🇷 Turkey: 34 🇺🇸 United States: 33

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    It's true and for that very reason. To see what does with these scans check out our blog that went live today.

    Poništi
  6. 4. velj
    Poništi
  7. 4. velj

    . is scanning the internet for Jenkins servers vulnerable to CVE-2020-2100. Jenkins 2.218 (LTS 2.204.1) and earlier are vulnerable to UDP amplification/reflection denial of service attacks.

    Poništi
  8. 4. velj

    ⚠️ 𝗪𝗔𝗥𝗡𝗜𝗡𝗚 ⚠️ Mass scanning activity detected from 185.220.101.28 (🇩🇪 Tor exit node) attempting to exploit Fortinet VPN servers vulnerable to unauthenticated arbitrary file read (CVE-2018-13379) leading to disclosure of usernames and passwords in plaintext.

    Poništi
  9. proslijedio/la je Tweet
    4. velj

    🚨 𝗔𝗟𝗘𝗥𝗧 🚨 Active DDoS botnet C2 server detected! IP address: 205.134.182.116 (🇺🇸) Hosting provider: AiNET (AS6405) C2 ports: 120/tcp 1028/tcp ftp://205.134.182.116/ Payload: Heartless~Security.*()

    Poništi
  10. 4. velj

    Active DDoS malware payload detected: http://173.242.143.112:43613/Mozi.m () Exploit attempt source IP: 173.242.143.112 (🇺🇸) Target: Netgear router unauthenticated remote command injection vulnerability ()

    Poništi
  11. 4. velj

    🚨 𝗔𝗟𝗘𝗥𝗧 🚨 Active DDoS botnet C2 server detected! IP address: 205.134.182.116 (🇺🇸) Hosting provider: AiNET (AS6405) C2 ports: 120/tcp 1028/tcp ftp://205.134.182.116/ Payload: Heartless~Security.*()

    Poništi
  12. proslijedio/la je Tweet

    Make sure your MSPs are patching your Citrix Gateway servers, as people are absolutely getting ransomware’d via this.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Round 2 – CVE-2019-19781 Scan Results Vulnerable Citrix servers detected: 7,133 Our latest vulnerability scan results are freely available for authorized government CERT, ISAC, and law enforcement teams. Submit request here:

    Prikaži ovu nit
    Poništi
  14. 3. velj

    "We've determined that an authentication certificate has expired causing users who have logged out and those that are still logged in to have issue using the service. We're developing a fix to apply a new authentication certificate to the service which will remediate impact."

    Poništi
  15. 2. velj

    🚨 𝗔𝗟𝗘𝗥𝗧 🚨 Active DDoS botnet C2 server detected! IP address: 207.154.212.220 (🇩🇪) Hosting provider: DigitalOcean (AS14061) C2 ports: 5301/tcp 9545/tcp http://207.154.212.220/bins/ Payload: Stanleyy.* ()

    Poništi
  16. 2. velj

    The mass exploitation of CVE-2019-7256 by DDoS botnet operators started on January 9th –

    Poništi
  17. 1. velj

    High volume of mass scanning activity checking for "/.aws/credentials" – uptick started around 2020-02-01T14:28:12Z. Bad Packets research and enterprise customers can query for "AWS Credentials File Scanner" to locate source IPs that are scanning.

    Poništi
  18. 1. velj

    We've detected opportunistic exploit activity targeting this vulnerability. Bad Packets™ tags are now available for our research and enterprise customers.

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    Systems patched for Citrix -2019-19781 may still be compromised. See 's latest Activity Alert at for procedures for detecting a compromise.

    Poništi
  20. 31. sij

    Mass scanning activity detected from 175.141.143.132 (🇲🇾) checking for Citrix (NetScaler) servers vulnerable to CVE-2019-19781. This critical vulnerability allows unauthenticated remote attackers to execute arbitrary commands on the targeted server.

    Poništi
  21. 31. sij

    High volume of masscan traffic detected from hosts in 92.118.37.0/24 (🇷🇴) – 2,400+ unique ports scanned ().

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·