What Vulnerabilities FreakOut Takes Advantage of for Creating a Botnetby@checkpoint

What Vulnerabilities FreakOut Takes Advantage of for Creating a Botnet

by Check Point Software9mSeptember 4th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Check Point Research encountered several attacks that exploited multiple vulnerabilities, including some that were only recently published, to inject OS commands. The goal behind the attacks was to create an IRC botnet, which can later be used for several purposes, such as DDoS attacks or crypto-mining. The attacks aim at devices that run one of the following: TerraMaster TOS, Zend Framework and Liferay Portal. The first attack trying to download the file was observed on January 8, 2021. Since then, hundreds of download requests have been made.

Company Mentioned

Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - What Vulnerabilities FreakOut Takes Advantage of for Creating a Botnet
Check Point Software HackerNoon profile picture
Check Point Software

Check Point Software

@checkpoint

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

L O A D I N G
. . . comments & more!

About Author

Check Point Software HackerNoon profile picture
Check Point Software@checkpoint
Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here