logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • MadPot: AWS Honeypot to Disrupt Threat Actors
  • How AWS threat intelligence deters threat actors
  • Microsoft’s Response to Open-Source Vulnerabilities – CVE-2023-4863 and CVE-2023-5217
  • Exim patches three of six zero-day bugs disclosed last week
  • NIST 800-82 R2/R3: A Practical Guide for OT Security Professionals

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-32828 (android, iot_yocto) 2 October 2023
  • CVE-2023-32829 (android, iot_yocto, yocto) 2 October 2023
  • CVE-2023-32826 (android) 2 October 2023
  • CVE-2023-32827 (android) 2 October 2023
  • CVE-2023-32830 (android) 2 October 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Dissecting the activities and capabilities of RIG Exploit Kit

Posted on 18 January 2020

From cyware.com

exploit, hacker, bash, shell, server, code, linux, engineer, python, network, program, loop, lan, internet, prompt, c, ping, computer, minix, source, core, soap, ip, shock, local, web, programming, kernel, html, programer, command, script, language, cracker, unix, host, plus, software
  • Over the past years, the exploit kit has been observed installing various malware ranging from banking trojans to ransomware.
  • However, since 2017, there has been a major shift in its activity and is being now used to deliver cryptominers as well

Read more…

Posted in News

Post navigation

Previous post: EU mulls five-year ban on facial recognition tech in public areas
Next post: Bluewall – A Firewall Framework Designed For Offensive And Defensive Cyber Professionals
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.