WSH-RAT kit is a complete Remote Administration tool sold in the underground and frequently abused by criminal actors relying on off-the-shelf kits to build their offensive campaigns.
The bugs were publicly disclosed on March 2, when the Microsoft announced not only patches for them, but also the fact that a Chinese threat actor had been actively exploiting them in attacks.
The actor behind the data dump claimed that it includes a complete database of Guns.com along with its source code. They further added that the breach took place somewhere around the end of 2020.
Many users of the digital art marketplace Nifty Gateway reported that hackers had taken over their accounts and stolen artwork worth thousands of dollars over the weekend.
The funding is being co-led by Advent International and Ten Eleven Ventures, with participation from Prelude Fund, Emerald Development Managers, Great Road Holdings, and cloud security firm Zscaler
To bypass detection, a phishing kit utilizes JavaScript to check whether a browser is running under a virtual machine or without an attached monitor. It displays a blank page in that case.
The number of global exploit attempts targeting vulnerable Microsoft Exchange servers has risen sixfold over the past few days, as Microsoft warned of a new ransomware threat to compromised systems.
Researchers found attacks using VisualDoor (SonicWall SSL-VPN), CVE-2020-25506 (D-Link firewall), CVE-2020-26919 (Netgear ProSAFE Plus), CVE-2019-19356 (Netis wireless router), and other exploits.
“The http://blender.org website is undergoing maintenance due to a hacking attempt,” the official Blender account on Twitter said earlier today, adding that it will be back as soon as possible.
The list of massive security failures occurring due to product or service architectures that give a single user or group unfettered privileges continues to grow everyday.