Blog
Share This Post
[ad_1]

Attacks with the HiatusRAT malware were noted by the FBI to have been launched against outdated internet-exposed web cameras and DVRs, particularly those manufactured by Hikvision and Xiongmai, since March, BleepingComputer reports.
Threat actors commenced scanning vulnerable online webcams and DVRs in the U.S., Canada, Australia, New Zealand, and the UK impacted by the CVE-2017-7921, CVE-2018-9995, CVE-2020-25078, CVE-2021-33044, and CVE-2021-36260 flaws, as well as default passwords, which were later compromised through the open-source authentication brute-force tool Medusa, according to the FBI. Immediate isolation of the affected devices has been recommended by the FBI, which also called on cybersecurity professionals and system admins to promptly report suspected indicators of compromise. Such a development comes after HiatusRAT — which was initially discovered by Lumen researchers to have been used for additional payload delivery — was leveraged to establish an obscured proxy network consisting of DrayTek Vigor VPN routers across the Americas and Europe.
Get essential knowledge and practical strategies to fortify your network security.
[ad_2]
Source link
Subscribe To Our Newsletter
Get updates and learn from the best
More To Explore
US Charges Five People Over North Korean IT Worker Scheme
[ad_1] The US has announced charges against five individuals involved in a fake IT workers scheme to funnel funds to
In Other News: VPN Supply Chain Attack, PayPal $2M Settlement, RAT Builder Hacks Script Kiddies
[ad_1] Noteworthy stories that might have slipped under the radar: Korean VPN supply chain attack, PayPal settles with New York