ProxyToken: Another nail-biter from Microsoft Exchange

Credit to Author: Pieter Arntz| Date: Tue, 31 Aug 2021 13:29:05 +0000

The latest episode of 2021’s longest-running saga doesn’t disappoint.

Categories: Exploits and vulnerabilities

Tags:

(Read more…)

The post ProxyToken: Another nail-biter from Microsoft Exchange appeared first on Malwarebytes Labs.

Read more

LemonDuck no longer settles for breadcrumbs

Credit to Author: Pieter Arntz| Date: Fri, 30 Jul 2021 17:19:31 +0000

LemonDuck is a versatile botnet that has expanded from infecting targets with cryptominers to more malicious malware.

Categories: Botnets

Tags:

(Read more…)

The post LemonDuck no longer settles for breadcrumbs appeared first on Malwarebytes Labs.

Read more

US, EU, UK, NATO blame china for “reckless” Exchange attacks

Credit to Author: Pieter Arntz| Date: Tue, 20 Jul 2021 14:11:48 +0000

The US, UK, EU, and NATO have have issued a coordinated, public censure of China for its role in attacks against Exchange servers earlier this year.

Categories: Exploits and vulnerabilities

Tags:

(Read more…)

The post US, EU, UK, NATO blame china for “reckless” Exchange attacks appeared first on Malwarebytes Labs.

Read more

Ransomware’s Russia problem

Credit to Author: Malwarebytes Labs| Date: Thu, 15 Jul 2021 10:55:49 +0000

Ransomware really, really doesn’t want to run in Russia or members of the Commonwealth of Independent States.

Categories: Malwarebytes news

Tags:

(Read more…)

The post Ransomware’s Russia problem appeared first on Malwarebytes Labs.

Read more

New Lemon Duck variants exploiting Microsoft Exchange Server

Credit to Author: rajeshnataraj| Date: Fri, 07 May 2021 12:30:35 +0000

In March, Microsoft published a set of critical fixes to Exchange Server following the discovery of  ProxyLogon–an exploit that was stolen or leaked from researchers within hours of its disclosure to Microsoft. The exploit is now widely available to cybercriminals, and unpatched and vulnerable Microsoft Exchange Servers continue to attract many threat actors to install cryptocurrency-miners, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/f5mbGzsxNSo” height=”1″ width=”1″ alt=””/>

Read more