新冠疫情在国内的防控形势已经由阴转晴,但全球范围内的爆发还在继续。在防控成为常态化的同时,人们更加关注“新冠病毒”的研究与调查。随着关注度的提升,越来越多的不法分子抓住人们关注新冠病毒的心理,利用新冠热点话题传播各类病毒。 近日,亚信安全截获“驱动人生”无文件挖矿病毒的最新变种文件,此变种能够绕过老版本的防护措施,伪装成“新冠病毒”相关邮件,通过给受感染主机的联系人发送电子邮件传播,利用人们对“新冠病毒”的好奇心,诱导收件人点击邮件附件,导致感染并继续传播病毒。 攻击流程. 病毒详细分析. 本次变种的计划任务是调用PowerShell访问下载a.jsp: a.
Source link
“驱动人生”挖矿病毒再更新,利用“新冠病毒”邮件传播
RELATED STORIES
Every person on the internet has a unique ID that belongs to the machine they’re...
Apple is making a new change in the way it secures the code running in...
Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source: https://malvuln.com/advisory/4932471df98b0e94db076f2b1c0339bd.txt
Contact: malvuln13@gmail.com
Media: twitter.com/malvuln
...
The RCE vulnerability allows attackers to execute arbitrary commands on the server, compromising the vCenter...
Triton is malware developed to affect industrial systems, particularly the Triconex safety system from Schneider....
Risk High Patch available YES Number of vulnerabilities 6 CVE ID CVE-2018-12404CVE-2018-18508CVE-2019-11745CVE-2019-17006CVE-2019-17007CVE-2020-1763 CWE ID CWE-300CWE-476CWE-787CWE-122CWE-20...
Microsoft announced today that the SolarWinds hackers gained access to source code for a limited...
The Netherlands Times reports that an investigation by Bitdefender (in cooperation with the radio news...
Router Security | IT Security News 19. February 2021 This report is six months old,...
A sophisticated exploit of SolarWinds network management software will take the Biden administration months to...
You must be logged in to post a comment.