• Mess of vulnerabilities expose Windows, Linux servers to attack

    From TechnologyDaily@1337:1/100 to All on Thu Aug 19 18:45:04 2021
    Mess of vulnerabilities expose Windows, Linux servers to attack

    Date:
    Thu, 19 Aug 2021 17:37:38 +0000

    Description:
    A cryptomining malware is floating around the web equipped with about two dozen exploits for server software.

    FULL STORY ======================================================================

    A cryptomining malware that exploits over twenty known vulnerabilities has been dubbed the King of Vulnerability Exploitation by cybersecurity experts.

    According to researchers at Chinese technology giant Tencent, the HolesWarm cryptomining malware , which targets both Windows and Linux servers , has
    been able to compromise over a thousand cloud hosts since June.

    Deciphering Tencents Chinese advisory, Threatpost says the researchers have advised both the government and corporate sector to patch the vulnerabilities exploited by HolesWarm without delay. TechRadar needs you!

    We're looking at how our readers use VPNs with streaming sites like Netflix
    so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

    Click here to start the survey in a new window << Here's our list of the best small business servers available These are the best dedicated server hosting providers Check our list of the best firewall apps and services

    Tencent security experts recommend that the operation and maintenance personnel of government and enterprise organizations actively repair
    high-risk vulnerabilities in related network components to avoid servers [becoming] a broiler controlled by hackers, states the advisory.
    'Inexcusable'

    Based on their analysis, the researchers note that the malware exploits well-known vulnerabilities in several software commonly found on servers,
    such as Apache Tomcat, Jenkins, Shiro, Spring boot, Structs2, Weblogic, and more.

    Once it has broken into a server, it absorbs it to its botnet, which mines
    for the Monero cryptocurrency. In addition to the cryptomining activity, the researchers suggest the malware also scoops stored credentials and gives backdoor access to the compromised server to the threat actors.

    Yaniv Bar-Dayan, CEO of security company Vulcan Cyber, told Threatpost that leaving unpatched vulnerabilities in internet-exposed servers is inexcusable.

    Organizations with exploitable known vulnerabilities should feel lucky if the worst that happens to their digital estate is a HolesWarm cryptominer deployment, she said. These are the best endpoint protection tools

    Via Threatpost



    ======================================================================
    Link to news story: https://www.techradar.com/news/mess-of-vulnerabilities-expose-windows-linux-se rvers-to-attack/


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)