mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,4 Tsd.
aktive Profile

#webshell

1 Beitrag1 Beteiligte*r0 Beiträge heute
ESET Research<p><a href="https://infosec.exchange/tags/BREAKING" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BREAKING</span></a> <a href="https://infosec.exchange/tags/ESETResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESETResearch</span></a> has been monitoring the recently discovered <a href="https://infosec.exchange/tags/ToolShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ToolShell</span></a> zero-day vulnerabilities in <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> Server: CVE-2025-53770 and CVE-2025-53771. SharePoint Online in Microsoft 365 is not impacted. <a href="https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">welivesecurity.com/en/eset-res</span><span class="invisible">earch/toolshell-an-all-you-can-eat-buffet-for-threat-actors/</span></a><br>ESET first detected an attempt to exploit part of the execution chain on July 17 in Germany 🇩🇪. Here, the final <a href="https://infosec.exchange/tags/webshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webshell</span></a> payload was not delivered. The first time we registered the payload was on July 18 in Italy 🇮🇹. We have since seen active ToolShell exploitation all over the world. <br>We have uncovered several IP addresses that were used in the attacks from July 17 to July 22. The charts show the timeline of the attacks from the three most active of these IP addresses. <br>ToolShell is being exploited by all sorts of threat actors, from petty cybercriminals to state-sponsored groups, among them China 🇨🇳-aligned <a href="https://infosec.exchange/tags/APTs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APTs</span></a>. We expect these attacks to continue taking advantage of unpatched systems.<br>IoCs available in our GitHub repo: <a href="https://github.com/eset/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/eset/</span><span class="invisible"></span></a></p>
Pyrzout :vm:<p>Compromised SAP NetWeaver instances are ushering in opportunistic threat actors <a href="https://www.helpnetsecurity.com/2025/05/12/compromised-sap-netweaver-instances-attacks-opportunistic-threat-actors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/05/12</span><span class="invisible">/compromised-sap-netweaver-instances-attacks-opportunistic-threat-actors/</span></a> <a href="https://social.skynetcloud.site/tags/incidentresponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incidentresponse</span></a> <a href="https://social.skynetcloud.site/tags/enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprise</span></a> <a href="https://social.skynetcloud.site/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Forescout" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Forescout</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Mandiant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mandiant</span></a> <a href="https://social.skynetcloud.site/tags/webshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webshell</span></a> <a href="https://social.skynetcloud.site/tags/Onapsis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Onapsis</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a></p>
Pyrzout :vm:<p>SAP NetWeaver Flaw Scores 10.0 Severity as Hackers Deploy Web Shells <a href="https://hackread.com/sap-netweaver-flaw-severity-hackers-deploy-web-shells/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/sap-netweaver-fla</span><span class="invisible">w-severity-hackers-deploy-web-shells/</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/SAPNetWeaver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAPNetWeaver</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/WebShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebShell</span></a> <a href="https://social.skynetcloud.site/tags/SAP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SAP</span></a></p>
hanshi :blackblob:<p>found this malware on my friend's site. checking on it and the original file looks so messy. vim can do `gg=G` to forcing re-indentation of the messed php file with html inside it &gt;.&lt;<br><a href="https://infosec.exchange/tags/webshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webshell</span></a></p>
Brad<p>2024-12-04 (Wednesday): Casual review of my most recent Apache web server access logs shows what looks like an attempt to get a PHP <a href="https://infosec.exchange/tags/webshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webshell</span></a> on my web server.</p><p>URL for the PHP webshell is hxxp://1.14.123[.]164/ote.txt</p>
:hacker_z: :hacker_o: :hacker_d: :hacker_s: :hacker_e: :hacker_c: 0xD :verified:<p>Popping webshells and slashers <a href="https://infosec.exchange/tags/hackingandhorrormovies" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingandhorrormovies</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacker</span></a> <a href="https://infosec.exchange/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a> <a href="https://infosec.exchange/tags/metasploitable2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>metasploitable2</span></a> <a href="https://infosec.exchange/tags/webshell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webshell</span></a> <a href="https://infosec.exchange/tags/php" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>php</span></a> <a href="https://infosec.exchange/tags/z0ds3c" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>z0ds3c</span></a> <a href="https://infosec.exchange/tags/horror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>horror</span></a> <a href="https://infosec.exchange/tags/80shorror" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>80shorror</span></a> <a href="https://infosec.exchange/tags/halloween4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>halloween4</span></a></p>