mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#screenconnect

0 Beiträge0 Beteiligte0 Beiträge heute
The New Oil<p>Hackers turn <a href="https://mastodon.thenewoil.org/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> into <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> using <a href="https://mastodon.thenewoil.org/tags/Authenticode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Authenticode</span></a> stuffing</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-turn-screenconnect-into-malware-using-authenticode-stuffing/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-turn-screenconnect-into-malware-using-authenticode-stuffing/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a></p>
OTX Bot<p>Be Careful With Fake Zoom Client Downloads</p><p>A deceptive email containing a fake Zoom meeting invitation has been identified. Clicking the 'join' button leads to a website prompting users to install a purported Zoom client update. The downloaded executable, 'Session.ClientSetup.exe', is actually malware that installs an MSI package. This package deploys ScreenConnect, a remote access tool, allowing attackers to gain unauthorized access to the victim's computer. The malware establishes persistence by installing itself as a service and connects to a command and control server at tqtw21aa.anondns.net on port 8041. Users are advised to exercise caution when receiving unexpected Zoom invitations or update prompts.</p><p>Pulse ID: 6841b92a2822d337bdf7bf39<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/6841b92a2822d337bdf7bf39" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/6841b</span><span class="invisible">92a2822d337bdf7bf39</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-06-05 15:35:06</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/DNS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DNS</span></a> <a href="https://social.raytec.co/tags/ELF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ELF</span></a> <a href="https://social.raytec.co/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/NET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NET</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> <a href="https://social.raytec.co/tags/Zoom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zoom</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> warns of <a href="https://mastodon.thenewoil.org/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a> <a href="https://mastodon.thenewoil.org/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> bug exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-connectwise-screenconnect-bug-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-warns-of-connectwise-screenconnect-bug-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Pyrzout :vm:<p>Fake Social Security Statement emails trick users into installing remote tool <a href="https://www.malwarebytes.com/blog/news/2025/04/fake-social-security-statement-emails-trick-users-into-installing-remote-tool" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">malwarebytes.com/blog/news/202</span><span class="invisible">5/04/fake-social-security-statement-emails-trick-users-into-installing-remote-tool</span></a> <a href="https://social.skynetcloud.site/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://social.skynetcloud.site/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> <a href="https://social.skynetcloud.site/tags/Molatori" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Molatori</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/SSA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSA</span></a></p>
Deutschland<p><a href="https://www.europesays.com/de/59942/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/de/59942/</span><span class="invisible"></span></a> Connectwise Screenconnect: Hochriskante Codeschmuggel-Lücke | heise online <a href="https://pubeurope.com/tags/Alert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Alert</span></a> <a href="https://pubeurope.com/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a> <a href="https://pubeurope.com/tags/Deutschland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deutschland</span></a> <a href="https://pubeurope.com/tags/Germany" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Germany</span></a> <a href="https://pubeurope.com/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://pubeurope.com/tags/Science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Science</span></a> <a href="https://pubeurope.com/tags/Science" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Science</span></a>&amp;Technology <a href="https://pubeurope.com/tags/Screenconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Screenconnect</span></a> <a href="https://pubeurope.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://pubeurope.com/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://pubeurope.com/tags/Sicherheitsupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsupdates</span></a> <a href="https://pubeurope.com/tags/Technik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technik</span></a> <a href="https://pubeurope.com/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://pubeurope.com/tags/Wissenschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wissenschaft</span></a> <a href="https://pubeurope.com/tags/Wissenschaft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wissenschaft</span></a>&amp;Technik</p>
IT News<p>This Week in Security: Wyze, ScreenConnect, and Untrustworthy Job Postings - For a smart home company with an emphasis on cloud-connected cameras, what could p... - <a href="https://hackaday.com/2024/02/23/this-week-in-security-wyze-screenconnect-and-untrustworthy-job-postings/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2024/02/23/this-w</span><span class="invisible">eek-in-security-wyze-screenconnect-and-untrustworthy-job-postings/</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/screenconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenconnect</span></a> <a href="https://schleuss.online/tags/spyware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spyware</span></a> <a href="https://schleuss.online/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://schleuss.online/tags/wyze" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wyze</span></a></p>
BSI WID Advisories Feed<p><a href="https://social.adlerweb.info/tags/BSI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSI</span></a> WID-SEC-2024-0468: [UPDATE] [kritisch] <a href="https://social.adlerweb.info/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a> <a href="https://social.adlerweb.info/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a>: Mehrere Schwachstellen</p><p>Ein entfernter Angreifer kann mehrere Schwachstellen in ConnectWise ScreenConnect ausnutzen, um Informationen offenzulegen oder um Sicherheitsmaßnahmen zu umgehen.</p><p><a href="https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0468" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wid.cert-bund.de/portal/wid/se</span><span class="invisible">curityadvisory?name=WID-SEC-2024-0468</span></a></p>
securityaffairs<p><a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> orders federal agencies to fix <a href="https://infosec.exchange/tags/ConnectWise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ConnectWise</span></a> <a href="https://infosec.exchange/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a> bug in a week<br><a href="https://securityaffairs.com/159511/hacking/cisa-connectwise-screenconnect-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/159511/hac</span><span class="invisible">king/cisa-connectwise-screenconnect-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
IT News<p>Ransomware associated with LockBit still spreading 2 days after server takedown - Enlarge (credit: Getty Images) </p><p>Two days after an international... - <a href="https://arstechnica.com/?p=2005464" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2005464</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/screenconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenconnect</span></a> <a href="https://schleuss.online/tags/connectwise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>connectwise</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/lockbit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lockbit</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
Andrew 🌻 Brandt 🐇<p><span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GossiTheDog</span></a></span> We all knew slash was dangerous. Guns N' Roses outside shoulda told ya. <a href="https://infosec.exchange/tags/Connectwise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Connectwise</span></a> <a href="https://infosec.exchange/tags/ScreenConnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ScreenConnect</span></a></p>
Digital Trust Center<p>🚨Kritieke kwetsbaarheden in ConnectWise ScreenConnect🚨</p><p>Er zijn kwetsbaarheden verholpen in de remote desktop softwareapplicatie ScreenConnect. De meest kritieke kwetsbaarheid geeft een ongeauthenticeerde kwaadwillende de mogelijkheid om een nieuw admin-account aan te maken en willekeurig code uit te voeren. </p><p>Het advies is om de beschikbare beveiligingsupdates zo snel mogelijk te (laten) installeren. </p><p>Meer informatie ⤵️</p><p><a href="https://www.digitaltrustcenter.nl/nieuws/kritieke-kwetsbaarheden-in-connectwise-screenconnect" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">digitaltrustcenter.nl/nieuws/k</span><span class="invisible">ritieke-kwetsbaarheden-in-connectwise-screenconnect</span></a></p><p><a href="https://social.overheid.nl/tags/cyberalert" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberalert</span></a> <a href="https://social.overheid.nl/tags/screenconnect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>screenconnect</span></a> <a href="https://social.overheid.nl/tags/dreigingsbericht" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dreigingsbericht</span></a></p>
Security Onion 🧅​<p>Quick <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> analysis: <a href="https://infosec.exchange/tags/ICEDID" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICEDID</span></a> variant with <a href="https://infosec.exchange/tags/BACKCONNECT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BACKCONNECT</span></a>, <a href="https://infosec.exchange/tags/ANUBIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ANUBIS</span></a> <a href="https://infosec.exchange/tags/VNC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VNC</span></a>, <a href="https://infosec.exchange/tags/COBALTSTRIKE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>COBALTSTRIKE</span></a> &amp; <a href="https://infosec.exchange/tags/SCREENCONNECT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SCREENCONNECT</span></a> pcap from 2023-10-18</p><p>Thanks to <br><span class="h-card" translate="no"><a href="https://infosec.exchange/@malware_traffic" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>malware_traffic</span></a></span> <br> for sharing this <a href="https://infosec.exchange/tags/pcap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pcap</span></a>!</p><p>More details:<br><a href="https://blog.securityonion.net/2023/11/quick-malware-analysis-icedid-variant.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.securityonion.net/2023/11</span><span class="invisible">/quick-malware-analysis-icedid-variant.html</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a><br><a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosecurity</span></a><br><a href="https://infosec.exchange/tags/ThreatHunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatHunting</span></a><br><a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a></p>