logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • What is Incident Response? Plans, Templates and Tools
  • PythonMemoryModule: load dll and unmanaged exe entirely from memory
  • Hackers Leak i2VPN Admin Credentials on Telegram
  • IT threat evolution in Q1 2023. Non-mobile statistics
  • Microsoft Sets Aside $425M for Anticipated GDPR Fine

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-3068 (retro_cellphone_online_store) 2 June 2023
  • CVE-2023-3060 (agro-school_management_system) 2 June 2023
  • CVE-2023-3061 (agro-school_management_system) 2 June 2023
  • CVE-2023-3062 (agro-school_management_system) 2 June 2023
  • CVE-2023-3059 (online_exam_form_submission) 2 June 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities

Posted on 5 October 2020

From gbhackers.com

Ttint IoT Botnet

Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT).

The botnet dubbed Ttint was found to be active since November 2019, along with DDoS capabilities it includes 12 remote access functions.

Read more…

Posted in News

Post navigation

Previous post: New Ttint IoT botnet exploits two zero-days in Tenda routers
Next post: Mobile Forensics: Are You Ready for iOS 14?
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.