logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts


  • Prilex modification now targeting contactless credit card transactions
  • Cyberattack confirmed as cause for phone and IT problems at British music school
  • DigiCert releases new unified approach to trust management
  • Latvia confirms phishing attack on Ministry of Defense, linking it to Russian hacking group
  • KeePass disputes vulnerability allowing stealthy password theft

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-42386 (pdf-xchange_editor) 26 January 2023
  • CVE-2022-40034 (javaweb_blog) 23 January 2023
  • CVE-2022-4017 (booster_elite_woocommerce, booster_for_woocommerce, booster_plus_woocommerce) 23 January 2023
  • CVE-2022-4230 (wp_statistics) 23 January 2023
  • CVE-2021-43445 (server) 23 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Muhstik Botnet Attack & Harvests Vulnerable Linux-based Tomato Routers To Perform DDOS Attacks

Posted on 26 January 2020

From cybersecuritynews.com

Muhstik Botnet

Researchers discovered a new variant of Muhstik IoT Botnet that targets the vulnerable Linux-based Tomato routers to perform DDOS Attack, launch cryptocurrency mining to earn profits, and harvest the new IoT devices.

Read more…

Posted in News

Post navigation

Previous post: Mozilla has banned nearly 200 malicious Firefox add-ons over the last two weeks
Next post: Huawei wants to break Intel’s chip dominance with Kunpeng
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.