logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • The Shifting Landscape of Open Source Supply Chain Attacks – Part 3
  • Chinese PlugX Malware Hidden in Your USB Devices?
  • Ukraine’s Critical Sectors Targeted in Phishing Attack Surge
  • 3 business application security risks businesses need to prepare for in 2023
  • Google slays thousands of fake news vids posted by pro-China group Dragonbridge

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2020-23256 (electerm) 20 January 2023
  • CVE-2020-29297 (online_food_ordering_system) 20 January 2023
  • CVE-2020-21152 (inxedu) 20 January 2023
  • CVE-2021-26644 (mangboard_wp) 20 January 2023
  • CVE-2021-27782 (bigfix_mobile) 20 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

LightMe: HTTP Server serving obfuscated Powershell Scripts/Payloads

Posted on 26 July 2021

From securityonline.info

LightMe

LightMe is a Simple HTTP Server serving Powershell Scripts/Payloads after Obfuscate them and run obfuscation as a service in the background in order to keep obfuscate the payloads which giving an almost new obfuscated payload on each HTTP request.

Read more…

Posted in News

Post navigation

Previous post: 1.2 Million Aussies Suffered when Uber was Breached in 2016
Next post: Excel Files Becoming More Sophisticated (Distribution of Dridex and Cobalt Strike)
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.