logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • The Shifting Landscape of Open Source Supply Chain Attacks – Part 3
  • Chinese PlugX Malware Hidden in Your USB Devices?
  • Ukraine’s Critical Sectors Targeted in Phishing Attack Surge
  • 3 business application security risks businesses need to prepare for in 2023
  • Google slays thousands of fake news vids posted by pro-China group Dragonbridge

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-42387 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42389 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42388 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42390 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-42386 (pdf-xchange_editor) 26 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities

Posted on 5 October 2020

From gbhackers.com

Ttint IoT Botnet

Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT).

The botnet dubbed Ttint was found to be active since November 2019, along with DDoS capabilities it includes 12 remote access functions.

Read more…

Posted in News

Post navigation

Previous post: New Ttint IoT botnet exploits two zero-days in Tenda routers
Next post: Mobile Forensics: Are You Ready for iOS 14?
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.