Tag Archive for: Script

Script Kiddie Responsible for Large Satori Botnet

  1. Script Kiddie Responsible for Large Satori Botnet  Security Boulevard
  2. Satori botnet: Hacker ‘Nexus Zeta’ found exploiting a Huawei zero-day flaw to spread Mirai variant  International Business Times UK
  3. Full coverage

zero day exploit – read more

Vulnerabilities Leave iTunes, App Store Open to Script Injection

Researchers say iTunes and Apple’s App Store suffer from a persistent input validation and mail encoding web vulnerability. If exploited, it could allow an attacker to inject their own malicious script.
Threatpost | The first stop for security news

Was the Dyn DDoS attack actually a script kiddie v. PSN?

The massive DDoS attack that disrupted the internet address-lookup service Dyn last week was perhaps pulled off by a script kiddie targeting PlayStation Network and using Mirai malware to assemble a massive IoT botnet, according to research by Flashpoint.

“Flashpoint assesses with moderate confidence that the most recent Mirai attacks are likely connected to the English-language hacking forum community, specifically uses and reads of the forum “hackforums.net,” according to a blog by Allison Nixon, director of security research at Flashpoint.

She says the company has discovered the infrastructure used in the Dyn attack also targeted “a well-known video game company” that she doesn’t name. A post on hackforums.net seems to agree with this possibility. It indicates the target was PlayStation Network and that Dyn was hit because it provides DNS services to PSN. Going after the name servers (NS) that provide lookups for PSN would prevent traffic from reaching PSN.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Intel Security scares ransomware script kiddie out of business

It was a textbook – and criminal – software as a service: Grant access to a software kit that makes it easy to lock up the hard drives on victims’ PCs, then skim 20% of the take from those who actually use the kit to extort payments.

The scheme experienced meteoric growth in just days, but once it became public knowledge its architect couldn’t stand the threat of legal problems and is now backing off – which wasn’t the original plan at all.

“Plan A was to stay quiet and hidden,” the coder wrote yesterday on the Tox malware site buried deep behind the onion router (Tor) network. But Plan A was overturned by researchers at Intel Security who found the site and wrote about it just four days after it was set up.

To read this article in full or to leave a comment, please click here

Network World Tim Greene