The BPFdoor malware has been undetected in the wild for more than five years – infecting Linux and Solaris systems. The malware can give remote access to the shell and complete control to a compromised system. BPFdoor: Stealthy Linux malware bypasses firewalls for remote access (bleepingcomputer.com) The twist with this …
Shopping for malware
How cheap it is for threat actors, who are less technically able, to set up a technically complex attack has been a theme on the blog over the last few weeks. More low-level cyber criminals joining in Budget friendly malware increases your risk Here is another article showing that the …
Happy Birthday WannaCry – but don’t expect a card from the NHS
All through my Masters course, the NHS WannaCry incident was an excellent reference to include in any paper I was writing. I use the incident in our online training course, CyberAwake, various articles I have written (and will write), in courses I run and just yesterday in the Cyber Security …
Continue reading “Happy Birthday WannaCry – but don’t expect a card from the NHS”
Satellite cyber-attacks, WhisperGate, AcidRain and the spread of the Russia Ukraine cyber conflict
Statements have been made this week by the European Union, the United States and other allies relating the WhisperGate cyber attacks that were directed at Ukraine but spilled over into the greater Europe damaging thousands of modems. This damage had the knock on effect of crippling wind turbines and subsequent …
Fork bombs for example – why you have to have up to date anti-virus software, be turned on to patching and training UPDATED 11 May 2022
This post was first published on 9 May 2022 Here is yet another example of malware and it’s delivery system from SANS TA578 using thread-hijacked emails to push ISO files for Bumblebee malware – SANS Internet Storm Centre The rise of Bumblebee malware was first reported earlier this month: More …