Meterpreter Used by Kimsuky Group to Attack Web Servers

skull_in_shell

The Kimsuky Group, known for its sophisticated cyberattacks, has been employing the powerful tool Meterpreter to target and compromise web servers. Meterpreter, a versatile post-exploitation framework, enables the group to gain unauthorized access and control over targeted systems, granting them the ability to extract sensitive data, plant malicious code, or carry out further nefarious activities.

AhnLab Security Emergency response Center (ASEC) has recently discovered the distribution of malware targeting web servers by Kimsuky group.

Source: Kimsuky Group Using Meterpreter to Attack Web Servers

Share this post

Surveillance cameras on wall

Russia Accuses US of Widespread Apple iPhone Hacking

Russia’s Federal Security Service (FSB) claims to have discovered an elaborate American espionage operation that compromised thousands of iPhones using sophisticated surveillance software. Moscow-based Kaspersky Lab confirmed that several of its employees’ devices were compromised during the operation.

Abstract powerlines

Mandiant Unearths New Malware That Can Sabotage Power Grids

A new strain of malware, dubbed COSMICENERGY, has been discovered that is designed to penetrate and disrupt critical systems in industrial environments. The malware is capable of exploiting an industrial communication protocol called IEC-104 to issue commands to RTUs, which could potentially cause power disruption. There is no evidence that the malware has been used in attacks, but its discovery is a reminder of the threat posed by malicious software to critical infrastructure.