Official forum for Utopia Community
You are not logged in.
I seem to have read everything I could find about mining here and in the chats and watched the videos. Yes, it is both easy and difficult at the same time, but it is possible.
Suppose I have rented a virtual server (it is impossible for me to mine on a PC for various reasons). For example, the price is $5 per month. According to the mining calculator, now I need to run 2 mining bots on each virtual server in order not to lose money.
The numbers in my example can be anything, but the question arises: how to run several bots on one server if each bot needs a new host? Perhaps I don’t understand something or I don’t know Linux well (and this is true) or in networks. If anyone knows a solution (maybe it's obvious to you?), please tell me.
You mine using a PC but it won't be profitable like mining using the UAM bot which is the latest mining style for CRP coin and if you have additional mining questions i will advise you to do that on the UtopiaP2P app client. In the mining support to be precise.
94 new domains have been connected to a Russa-nexus adversary, indicating that the organization is actively changing its infrastructure in response to information about its activities being made public.
The new infrastructure was connected to a threat actor known as BlueCharlie by cybersecurity firm Recorded Future. This hacking group also goes by the names Blue Callisto, Callisto (or Calisto), COLDRIVER, Star Blizzard (formerly SEABORGIUM), and TA446. Threat Activity Group 53 (TAG-53), a provisional name for BlueCharlie, was previously assigned.
According to a recent technical report shared with The Hacker News, the company, "These shifts demonstrate that these threat actors are aware of industry reporting and show a certain level of sophistication in their efforts to obfuscate or modify their activity, aiming to stymie security researchers.".
The threat actor BlueCharlie has been connected to phishing campaigns that target credential theft by using domains that pose as the login pages of private sector companies, nuclear research labs, and non-governmental organizations (NGOs) working to alleviate the Ukraine crisis. BlueCharlie is believed to be affiliated with Russia's Federal Security Service (FSB). It's reportedly been operational since at least 2017.
According to a statement made by Sekoia earlier this year, "Calisto collection activities probably contribute to Russian efforts to disrupt Kiev's supply-chain for military reinforcements.". Additionally, Russian intelligence gathering regarding evidence of war crimes is probably done in order to foresee and develop a defense against accusations in the future. ".
BlueCharlie.
Another NISOS report released in January 2023 revealed possible links between the group's attack infrastructure and a Russian firm that works with local governments.
Recorded Future stated that "BlueCharlie has carried out persistent phishing and credential theft campaigns that further enable intrusions and data theft," adding that the actor conducts thorough reconnaissance to increase the likelihood of its attacks' success.
According to the most recent research, BlueCharlie has adopted a new naming scheme for its domains that include words like cloudrootstorage[ that are connected to cryptocurrencies and information technology.
Com, directexpressgateway.
[.com, storagecryptogate.
]com, as well as pdfsecxcloudroute[. ]com.
According to reports, 78 of the 94 new domains were registered using NameCheap. Porkbun and Regway are a couple of the other domain registrars employed.
It is advised that organizations implement phishing-resistant multi-factor authentication (MFA), disable macros by default in Microsoft Office, and enforce a frequent password reset policy to reduce threats posed by state-sponsored advanced persistent threat (APT) groups.
"The group uses relatively common attack methods (such as the use of phishing and a historical reliance on open-source offensive security tools), but its likely continued use of these methods, determined posture, and progressive evolution of tactics suggests the group remains formidable and capable," the company stated.
thrive;19937 wrote:joanna;19865 wrote:Users cannot easily access the application from different devices unless they install the application separately on each device or use remote access methods.
Desktop applications may have specific hardware requirements, such as processor speed, memory, or graphics capabilities.
Well yes you are right the desktop application is obviously the best and far better than the mobile application but it would not be easy and the requirements are amazing .
Utopia offers a range of features that are not found on other P2P networks, such as its all-in-one kit for secure instant messaging, encrypted email, voice communication, private web browsing and file transfer.
Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors, including cybercrime groups and nation-state crews.
"Although Cloudzy is incorporated in the United States, it almost certainly operates out of Tehran, Iran – in possible violation of U.S. sanctions – under the direction of someone going by the name Hassan Nozari," Halcyon said in a new report published Tuesday.
The Texas-based cybersecurity firm said the company acts as a command-and-control provider (C2P), which provides attackers with Remote Desktop Protocol (RDP) virtual private servers and other anonymized services that ransomware affiliates and others use to pull off the cybercriminal endeavors.
"[C2Ps] enjoy a liability loophole that does not require them to ensure that the infrastructure they provide is not being used for illegal operations," Halcyon said in a statement shared with The Hacker News.
The ransomware-as-a-service (RaaS) business model is a highly-evolving one, encompassing the core developers; affiliates, who carry out the attacks in exchange for a cut; and initial access brokers, who exploit known vulnerabilities or stolen credentials to obtain a foothold and sell that access to affiliates.
The emergence of C2P providers points to a new set of actors who "knowingly or unwittingly" provide the infrastructure to carry out the attacks.
Ransomware
Some of the key actors that are assessed to be leveraging Cloudzy include state-sponsored entities from China (APT10), India (Sidewinder), Iran (APT33 and APT34), North Korea (Kimsuky, Konni, and Lazarus Group), Pakistan (Transparent Tribe), Russia (APT29 and Turla), and Vietnam (OceanLotus) as well as cybercrime entities (Evil Corp and FIN12).
Also in the mix are two ransomware affiliates dubbed Ghost Clown and Space Kook which use the BlackBasta and Royal ransomware strains, respectively, and the controversial Israeli spyware vendor Candiru.
It's suspected that malicious actors are banking on the fact that purchasing VPS services from Cloudzy only requires a working email address and anonymous payment in cryptocurrency, thus making it ripe for abuse and raising the possibility that threat actors could be weaponizing little-known firms to fuel major hacks.
"If your VPS server is suspended because of misuse or abusive usage such as prohibited uses: Phishing, Spamming, Child Porn, Attacking other people, etc.," reads the support documentation on Cloudzy's website. "There is a $250-$1000 fine or NO WAY for unsuspension; this depends on the complaint type."
"While these C2P entities are ostensibly legitimate businesses that may or may not know that their platforms are being abused for attack campaigns, they nonetheless provide a key pillar of the larger attack apparatus leveraged by some of the most advanced threat actors," the company said.
The stealer malware NodeStealer has a Python variant that can completely take over Facebook business accounts and siphon cryptocurrency, according to cybersecurity researchers.
As part of a campaign that started in December 2022, Palo Alto Network Unit 42 claimed to have discovered the previously unidentified strain.
NodeStealer was first identified by Meta in May 2023, who described it as a stealer that could compromise Facebook, Gmail, and Outlook accounts by gathering cookies and passwords from web browsers. The most recent samples were created in Python as opposed to the earlier ones, which were created in JavaScript.
According to Unit 42 researcher Lior Rochberger, "NodeStealer poses great risk for both individuals and organizations.". In addition to having a direct financial impact on Facebook business accounts, the malware also steals browser login information that can be used in future attacks. ".
The attacks begin with fake Facebook messages that allegedly offer free "professional" budget tracking Microsoft Excel and Google Sheets templates, tricking victims into downloading a ZIP archive file hosted on Google Drive.
The stealer executable is embedded in the ZIP file and is intended to download additional malware like BitRAT and XWorm as ZIP files, disable Microsoft Defender Antivirus, and steal cryptocurrency using MetaMask credentials from the Google Chrome, Cc Cc, and Brave web browsers, in addition to capturing Facebook business account information.
The downloads are carried out using a User Account Control (UAC) bypass method that makes use of the fodhelper. exe to run PowerShell scripts that download ZIP files from a distant server.
It's important to note that the threat actors behind the Casbaneiro banking malware have also used the FodHelper UAC bypass technique to gain elevated privileges on infected hosts.
The upgraded Python version of NodeStealer, according to Unit 42, goes beyond credential and cryptocurrency theft by implementing anti-analysis features, parsing emails from Microsoft Outlook, and even attempting to hijack the associated Facebook account.
The files are exfiltrated through the Telegram API after the necessary data has been gathered, and then they are removed from the computer to remove the trail.
NodeStealer is another piece of malware that joins the likes of Ducktail in the growing trend of Vietnamese threat actors trying to hack Facebook business accounts in order to commit advertising fraud and spread malware to other users of the social media platform.
NodeStealer.
As part of a multi-stage phishing attack, threat actors have been seen using WebDAV servers to deploy BATLOADER, which is then used to disseminate XWorm.
Rochberger advised Facebook business account owners to enable multi-factor authentication and use strong passwords. "Spend the time to educate your company on phishing techniques, particularly modern, targeted strategies that capitalize on business requirements, current events, and other alluring topics. ".
thrive;20023 wrote:Vastextension;20022 wrote:This can lead to difficulties in file sharing, collaboration, or communication, especially if important features or improvements are specific to a certain version.
Desktop applications can be susceptible to security risks, such as malware, viruses, or vulnerabilities that can be exploited.
Users need to be cautious when downloading and installing applications from untrusted sources or when executing unknown files to mitigate these risks.
It's worth noting that some of these disadvantages can be mitigated with proper application design, updates, and user education.
thrive;20021 wrote:Vastextension;20020 wrote:Sharing files often involves manual actions, like emailing attachments or using external file-sharing services, which can be less efficient than cloud-based collaboration tools.
Compatibility issues can arise when different users or systems have different versions of the application installed.
This can lead to difficulties in file sharing, collaboration, or communication, especially if important features or improvements are specific to a certain version.
Desktop applications can be susceptible to security risks, such as malware, viruses, or vulnerabilities that can be exploited.
thrive;20019 wrote:Vastextension;20018 wrote:This can involve dedicated resources and infrastructure to ensure continuous operation, which may not be feasible for individual developers or small teams.
Collaboration and sharing of data across multiple users or devices may be more challenging with desktop applications.
Sharing files often involves manual actions, like emailing attachments or using external file-sharing services, which can be less efficient than cloud-based collaboration tools.
Compatibility issues can arise when different users or systems have different versions of the application installed.
thrive;20017 wrote:Vastextension;20016 wrote:This can restrict usage to devices that meet these requirements, potentially excluding older or less powerful devices from utilizing the application effectively.
Desktop applications typically require regular maintenance and support, including bug fixes, compatibility updates, and user assistance.
This can involve dedicated resources and infrastructure to ensure continuous operation, which may not be feasible for individual developers or small teams.
Collaboration and sharing of data across multiple users or devices may be more challenging with desktop applications.
thrive;19937 wrote:joanna;19865 wrote:Users cannot easily access the application from different devices unless they install the application separately on each device or use remote access methods.
Desktop applications may have specific hardware requirements, such as processor speed, memory, or graphics capabilities.
This can restrict usage to devices that meet these requirements, potentially excluding older or less powerful devices from utilizing the application effectively.
Desktop applications typically require regular maintenance and support, including bug fixes, compatibility updates, and user assistance.
A Russa-nexus adversary has links to 94 new domains, which suggests that the organization is actively changing its infrastructure in response to information being made public about its operations.
The new infrastructure was linked by the cybersecurity company Recorded Future to a threat actor it monitors under the name BlueCharlie, a hacking group also known as Blue Callisto, Callisto (or Calisto), COLDRIVER, Star Blizzard (formerly SEABORGIUM), and TA446. Threat Activity Group 53 (TAG-53), a provisional name for BlueCharlie, was previously assigned.
The company stated in a recent technical report shared with The Hacker News that "these shifts demonstrate that these threat actors are aware of industry reporting and show a certain level of sophistication in their efforts to obfuscate or modify their activity, aiming to stymie security researchers.".
According to assessments, BlueCharlie is connected to Russia's Federal Security Service (FSB). The threat actor has been involved in phishing campaigns that target credential theft by using domains that impersonate the login pages of private sector businesses, nuclear research facilities, and non-governmental organizations (NGOs) working to alleviate the Ukraine crisis. It's reportedly been operational since at least 2017.
Sekoia noted earlier this year that "calisto collection activities probably contribute to Russian efforts to disrupt Kiev's supply-chain for military reinforcements.". Furthermore, Russian intelligence gathering on evidence related to war crimes is probably done to prepare a defense against potential accusations. ".
BlueCharlie.
NISOS released another report in January 2023 that suggested there might be ties between the group's attack infrastructure and a Russian firm that works with the country's government.
Recorded Future stated that "BlueCharlie has carried out persistent phishing and credential theft campaigns that further enable intrusions and data theft," adding that the actor conducts thorough reconnaissance to increase the likelihood of its attacks' success.
The most recent discoveries demonstrate that BlueCharlie has adopted a new naming pattern for its domains that include terms associated with cryptocurrencies and information technology, such as cloudrootstorage[.
DirectExpressGateway, ]com.
]com, storagecryptogate [.
[pdfsecxcloudroute] and [com. ]com.
One source claims that NameCheap was used to register 78 of the 94 new domains. Porkbun and Regway are a few of the additional domain registrars used.
It is advised that organizations implement phishing-resistant multi-factor authentication (MFA), disable macros by default in Microsoft Office, and enforce a frequent password reset policy to reduce threats posed by state-sponsored advanced persistent threat (APT) groups.
"The group uses relatively common attack methods (such as the use of phishing and a historical reliance on open-source offensive security tools), but its likely continued use of these methods, determined posture, and progressive evolution of tactics suggests the group remains formidable and capable," the company said.
An aggressive campaign discovered in June and July 2023 targets a variety of European customers of various banks with the Android banking trojan known as SpyNote.
Italian cybersecurity company Cleafy stated in a technical analysis published on Monday that "the spyware is distributed through email phishing or smishing campaigns and the fraudulent activities are executed with a combination of remote access trojan (RAT) capabilities and vishing attack.".
SpyNote, which is also known as SpyMax, is comparable to other Android banking Trojans in that it needs Android's accessibility permissions in order to obtain other crucial permissions and gather private information from infected devices. Due to its ability to both act as spyware and commit bank fraud, the malware strain stands out.
The attack chains start with a fake SMS message advising users to install a banking app by clicking on the link that appears with it. This links directs the victim to the real TeamViewer QuickSupport app that is available on the Google Play Store.
Security expert Francesco Iubatti claimed that "a number of [threat actors] have adopted TeamViewer to carry out fraud operations through social engineering attacks.". In particular, the assailant calls the victim and pretends to be a bank employee before carrying out fraudulent transactions on the victim's device. ".
The plan is to use TeamViewer as a conduit to get remote access to the victim's phone and covertly install the malware. SpyNote collects a variety of information, including SMS messages, keystrokes, screen captures, geolocation data, and keystrokes to get around SMS-based two-factor authentication (2FA).
Android Trojan SpyNote.
The revelation comes as the hacking group Bahamut has been connected to a fresh campaign that targets people in the Middle East and South Asia with the aim of installing a fake chat app called SafeChat that hides an Android malware called CoverIm.
Delivered to victims via WhatsApp, the app has features that are identical to those of SpyNote and asks for access permissions and other permissions to collect call logs, contacts, files, location, and SMS messages. It also asks for permission to install additional apps and steal data from Facebook Messenger, imo, Signal, Telegram, Viber, and WhatsApp.
According to Cyfirma, which discovered the most recent activity, the threat actor's methods are similar to those of the DoNot Team, a nation-state actor that was recently seen using rogue Android apps that were uploaded to the Play Store to infect people in Pakistan.
Android Trojan SpyNote.
Although the precise details of the social engineering component of the attack are unknown, Bahamut is well known for using fictitious personas on Facebook and Instagram to pose as journalists, students, activists, tech recruiters at major tech companies, and other people to trick unaware users into downloading malware on their devices.
According to information released by Meta in May 2023, "Bahamut used a variety of tactics to host and distribute malware, including running a network of malicious domains pretending to offer secure chat, file-sharing, connectivity services, or news applications.". "Some of them used spoofed versions of legitimate app stores, political parties, or local media outlets to make their links seem more trustworthy. ".
I think no one would have issues using the Crypton exchange as it is easy and user friendly. Getting all knowledge about the exchange before using it is a basic step than diving into Crypton exchange
You're have a point but not only Crypton exchange and if you notice you'll see that almost the service provided by the UtopiaP2P ecosystem were create to be easy and user friendly.
oba;19855 wrote:thrive;19854 wrote:It's important to note that while CRP offers strong security and privacy features, it is still essential for individuals to take responsibility for securing their own wallets and maintaining good security practices.
This includes using secure wallet solutions, enabling two-factor authentication (2FA), and keeping backup copies of wallet data in secure locations.
These secured measures are just the 3 simple steps to security of and account,wallet and transactionis. the other needful measures will be base on the outside the utopia ecosystem services which are not sharing your detailswith anyone.
Yes, the idea of not sharing information with anymore is something every crypto enthusiast must do. Apart from that, what is need is knowledge.
An Eastern European industrial organization was the target of several attacks last year to steal data from air-gapped systems, all of which are thought to have been carried out by a nation-state actor with ties to China.
APT31, a hacker group also known as Bronze Vinewood, Judgement Panda, and Violet Typhoon (formerly Zirconium), was the group responsible for the intrusions, according to cybersecurity firm Kaspersky, who put their confidence in their conclusion with a medium to high level of certainty.
Based on their capacity to establish persistent remote access, gather sensitive information, and transmit the collected data to actor-controlled infrastructure, the attacks involved the use of more than 15 different implants and their variants. These implants were divided into three major categories.
One of the implant types "appeared to be a sophisticated modular malware, aimed at profiling removable drives and contaminating them with a worm to exfiltrate data from isolated, or air-gapped, networks of industrial organizations in Eastern Europe," Kaspersky said.
"The other implant type is intended to steal data from a local computer and send it to Dropbox with the aid of the subsequent implant types. ".
One collection of backdoors consists of various iterations of the FourteenHi malware family, which has been in circulation since at least mid-March 2021 and has a wide range of capabilities, including the ability to upload and download arbitrary files, execute commands, launch a reverse shell, and remove its own presence from the compromised hosts.
MeatBall is a second first-stage backdoor used for remote access and initial data collection. It has the ability to list active processes, enumerate connected devices, operate on files, take screenshots, and self-update.
A third type of first-stage implant that uses Yandex Cloud for command-and-control has also been found, echoing findings from Positive Technologies in August 2022 outlining APT31 attacks on Russian media and energy companies.
"The propensity to misuse cloud-based services (e.
g.
as well as Google, Yandex, and Dropbox. (which is not a new problem, but it keeps growing because it is difficult to contain or mitigate when an organization's business operations rely on the use of such services, according to Kaspersky researchers.
Threat actors continue to make it more challenging to identify and analyze threats by concealing payloads in encrypted form in separate binary data files and by putting malicious code into the memory of trusted applications using DLL hijacking and a series of memory injections. ".
Dedicated implants have also been seen being used by APT31 to steal data from air-gapped systems by infecting removable drives and gathering local files.
The latter malware strain consists of at least three modules, each of which performs a different function, such as handling and profiling removable drives, capturing keystrokes and screenshots, and installing subsequent malware on newly connected drives.
According to Kirill Kruglov, senior security researcher at Kaspersky ICS CERT, the threat actor made conscious efforts to obscure their actions using encrypted payloads, memory injections, and DLL hijacking.
While data exfiltration from air-gapped networks is a common tactic used by many APTs and targeted cyberespionage campaigns, the actor this time around has designed and carried out the operation specifically. ".
The aforementioned attack chains were specifically designed for the Windows environment, but there is evidence that APT31 has also targeted Linux systems.
The AhnLab Security Emergency Response Center (ASEC) discovered attacks earlier this month against South Korean businesses with the intention of infecting the machines with a backdoor referred to as Rekoobe.
According to ASEC, Rekoobe is a backdoor that can take instructions from a [command-and-control] server to carry out a number of tasks, including downloading malicious files, stealing internal files from a system, and executing reverse shell.
Although its structure may be straightforward, it uses encryption to avoid network packet detection and is capable of a wide range of malicious actions when given orders by the threat actor. ".
thrive;19863 wrote:Vastextension;19862 wrote:Additionally, users must manually update the application to access new features or security patches, which can be inconvenient and potentially lead to outdated software vulnerabilities.
Desktop applications are bound to the device on which they are installed, limiting access to specific machines.
Users cannot easily access the application from different devices unless they install the application separately on each device or use remote access methods.
Desktop applications may have specific hardware requirements, such as processor speed, memory, or graphics capabilities.
joanna;19861 wrote:thrive;19860 wrote:This can limit the availability and compatibility of the application across different platforms, requiring separate development and maintenance efforts for each target system.
Desktop applications usually require installation on the user's device, which can be time-consuming and may require administrative privileges.
Additionally, users must manually update the application to access new features or security patches, which can be inconvenient and potentially lead to outdated software vulnerabilities.
Desktop applications are bound to the device on which they are installed, limiting access to specific machines.
Lanistergame2;19803 wrote:thrive;18538 wrote:The UtopiaP2P desktop application only has one disadvantage from my own understanding which is accessible on the go but the mobile application has a lot of disadvantages.
This is not a disadvantage for me. I know of may useful websites that only have a desktop feature and its users can easily adjust to that to benefit from what the website offers.
Utopia reaches a wide variety of users and is easily accessible by everyone, it will be a plus to have a mobile app, but it can be used on mobile phones too.There are several disadvantages desktop applications which include one of have mentioned and another is the desktop applications are typically designed for specific operating systems, such as Windows, macOS, or Linux.
This can limit the availability and compatibility of the application across different platforms, requiring separate development and maintenance efforts for each target system.
joanna;19852 wrote:oba;19851 wrote:Crypton employs advanced encryption algorithms, such as Curve25519, XSalsa20, and Poly1305, to secure transactions and connections between peers. This enhances the overall security of the network.
By mining CRP or holding a balance of Cryptons, users are eligible to receive regular interest rewards.
These rewards incentivize participation in the network and help to secure the ecosystem.
It's important to note that while CRP offers strong security and privacy features, it is still essential for individuals to take responsibility for securing their own wallets and maintaining good security practices.
joanna;19847 wrote:oba;19846 wrote:You're right since keeping funds in CRP coin can provide a high level of security and privacy.
RP transactions are fully anonymous and untraceable. The blockchain does not reveal any identifying information about the sender or recipient, ensuring privacy.
CRP operates on a decentralized network, meaning there is no central authority or single point of failure. This makes it more resistant to hacking or attacks.
Once a CRP coin transaction is confirmed and added to the blockchain, it cannot be reversed or altered. This ensures that funds are secure from fraudulent activities or unauthorized changes.
joanna;19840 wrote:oba;19839 wrote:I like the engage with the UtopiaP2P community on social media platforms, application client, forums, or chat groups.
That's true because sometimes, community members or Utopia itself may organize giveaways where you can win vouchers.
UtopiaP2P also conduct surveys per user or seek user feedback. By participating in these surveys, you may have a chance to win vouchers as a reward.
Remember to always follow the official UtopiaP2P channels and verify any giveaways or events to ensure their legitimacy.
joanna;19828 wrote:oba;19827 wrote:Regularly check your account activity and set up alerts for any suspicious transactions or activities.
Keeping a close eye on your accounts can help you detect any further unauthorized access or activity and take swift action.
Unfortunately, there is no guarantee of recovering all of your stolen funds. Cryptocurrency transactions are typically irreversible, and if the hacker has already transferred or laundered your funds, it may be challenging to trace or recover them.
Be mentally prepared for potential loss and exercise caution and due diligence in the future.
oba;19789 wrote:Vastextension;19788 wrote:Inform them about the hack and follow their instructions for reporting the incident. They may have specific procedures in place for handling security breaches and may be able to assist you in the recovery process.
Change your passwords immediately for all accounts associated with your crypto wallet, including the exchange or wallet provider, associated email addresses, and any other accounts that may have been compromised.
Enable two-factor authentication if you haven't already to add an extra layer of security.
Collect as much information about the hack as you can. Reviewing transaction history, timestamps, IP addresses, or any available logs or notifications from the exchange or wallet provider may be required.
The Ninja Forms WordPress plugin has been found to contain a number of security flaws that could be used by hackers to gain elevated privileges and steal confidential information.
The vulnerabilities affect versions 3.6 and are identified as CVE-2023-37979, CVE-2023-38386, and CVE-2023-38393. 25 and under, according to a report from Patchstack published last week. More than 800,000 websites use Ninja Forms.
The vulnerabilities are each briefly described below -.
CVE-2023-37979 (CVSS score: 7.1) – A POST-based reflected cross-site scripting (XSS) vulnerability that could allow any unauthorized user to escalate their privileges on a target WordPress website by tricking authorized users into visiting a specially crafted website.
The form submissions export feature contains broken access control flaws (CVE-2023-38386 and CVE-2023-38393), which could allow a malicious user with the Subscriber and Contributor roles to export every Ninja Forms submission on a WordPress site.
Updates to version 3.6 of the plugin are advised for users. 26 to lessen potential threats.
The disclosure comes shortly after Patchstack identified a flaw affecting versions prior to 2.5 of the Freemius WordPress software development kit (SDK) that causes reflected XSS vulnerabilities. 10 vulnerabilities that could be used to elevate privileges (CVE-2023-33999).
The HT Mega plugin's critical bug (CVE-2023-37999), which is present in versions 2.2, was also found by the WordPress security company. 0 and lower that permits any unauthenticated user to elevate their privilege to that of any role on the WordPress website.
More information has become available about the AVRecon botnet, which has been seen using compromised SOHO routers as part of a multi-year campaign that has been going on since at least May 2021.
The malware known as AVRecon was first made public by Lumen Black Lotus Labs earlier this month. It is capable of running additional commands and stealing victims' bandwidth for what appears to be an illicit proxy service used by other actors. Additionally, it has outperformed QakBot in terms of scope, having compromised over 41,000 nodes spread across 20 different nations.
The malware has been used to build residential proxy services to hide illegal activity like password spraying, web traffic proxies, and ad fraud, according to the researchers' report.
This has been confirmed by recent research from KrebsOnSecurity and Spur . us, which last week revealed that "AVrecon is the malware engine behind a 12-year-old service called SocksEscort, which rents hacked residential and small business devices to cybercriminals looking to conceal their true location online. ".
Direct similarities between SocksEscort and the command-and-control (C2) servers of AVRecon serve as the foundation for the connection. According to reports, SocksEscort and Server Management LLC, a Moldovan firm, both offer mobile VPN services under the brand name HideIPVPN on the Apple Store.
The new infrastructure Black Lotus Labs discovered in connection with the malware exhibited the same traits as the previous AVrecon C2s, the company told The Hacker News.
Botnet called AVRecon.
The newly relocated SocksEscort nodes (Source: Lumen Black Lotus Labs), which took place during the second week of July.
The threat actors, according to the company's assessment, were attempting to maintain control over the botnet by null-routing their infrastructure in response to the publication. "This suggests the actors want to continue monetizing the botnet by maintaining some access and signing up users for the SocksEscort 'proxy as a service. '".
Due to the fact that routers and other edge appliances are frequently vulnerable to security flaws, they may not support endpoint detection and response (EDR) solutions, and they are built to handle higher bandwidths, they have recently become lucrative attack vectors.
Additionally, AVRecon poses a greater risk because of its capacity to launch a shell on a compromised system, giving threat actors the opportunity to obfuscate their own malicious traffic or collect additional malware for further post-exploitation.
The ability to spawn a remote shell was embedded in the file, the researchers said, even though the SocksEscort proxy service is where the majority of these bots are added.
"This could give the threat actor the ability to deploy additional modules, so we suggest that managed security providers try to look into these devices in their networks, while home users should power-cycle their devices. ".