Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers operate a serious lack of PHP to deploy miners Quasar Rat and Xmrig
Global Security

Hackers operate a serious lack of PHP to deploy miners Quasar Rat and Xmrig

AdminBy AdminMarch 19, 2025No Comments2 Mins Read
PHP Flaw to Deploy Quasar RAT
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 19, 2025Red LakshmananIntelligence threatens / crypto

Lack of PHP to deploy Quasar Rat

The actors threatens exploit a serious lack of security in PHP to deliver cryptocurrency miners and remote access (rats) like Quasar Rat.

Vulnerability assigned to CVE ID Cve-2024-4577Refers to argument vulnerability in PHP that affect Windows -based systems that work in CGI, which can allow distant attackers to run an arbitrary code.

Cybersecurity Company Bitdefender – Note Since the end of last year, he observed attempts to operate against the CVE-2024-4577, and a significant concentration was reported in Taiwan (54.65%), Hong Kong (27.06%), Brazil (16.39%), Japan (1.57%) and India (0.33%).

Cybersecurity

About 15% of the revealed attempts to operate the main inspections of the vulnerability, using teams such as “Whoami” and “Echo .

Martin Tsugiak, Director of Technical Decisions in Bitdefender, noted that about 5% of the identified attacks ended in the deployment of the Xmrig cryptocurrency miner.

“Another smaller company provided for the deployment of Nicehash miners, a platform that allows users to sell computing for cryptocurrency,” Zegek added. “The miner process was disguised as a legitimate application, such as Javawindows.exe to avoid detection.”

Lack of PHP to deploy Quasar Rat

Other attacks have been found to have been found to arm the shortage of remote access tools such as Quasar Courting, and execute malicious installation files (MSI), located on remote servers using cmd.exe.

The Romanian company may have said that it also observed attempts to change the firewall configuration on vulnerable servers to block access to well -known malicious IPS related exploitation.

Such an unusual behavior has caused the possibility that the rival crypto -group competes for control of susceptible resources and preventing them from focusing on those under their control for the second time. This also matches historic observation As we know, Cryptjacking attacks stop the rivals of the miners before deploying their own useful loads.

Cybersecurity

Development occurs shortly after cisco talos disclosed Details of the PHP lack of lack of attacks on attacks aimed at Japanese organizations since the beginning of the year.

Users are advised to update their PHP installations to the latest version to protect against potential threats.

“As most companies use Lotl tools, organizations must consider limiting the use of tools such as PowerShell in the environment only privileged users such as administrators,” Tsugiak said.

Found this article interesting? Keep track of us next Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.