
"Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there's a lot happening in the cyber world. Criminals are getting creative - using smart tricks to steal data, sound real, and hide in plain sight. But they're not the only ones moving fast. Governments and security teams are fighting back, shutting down fake networks, banning risky projects, and tightening digital defenses."
"The botnet exploited several flaws, including CVE-2009-2765 (DDWRT), CVE-2020-25506, CVE-2022-37055, CVE-2024-10914, CVE-2024-10915 (D-Link), CVE-2023-52163 (DigiEver), CVE-2024-3721 (TBK), and CVE-2024-53375 (TP-Link), to recruit susceptible gear into a zombie army of IoT devices. A successful exploitation is followed by the execution of a downloader shell script that delivers the ShadowV2 malware for subsequent DDoS attacks. "IoT devices remain a weak link in the broader cybersecurity landscape," the company said. "The evolution of ShadowV2 suggests a strategic shift in the targeting behavior of threat actors toward IoT environments.""
Cybercriminals used fake voice calls, AI-powered malware, money-laundering schemes, and new scams to steal data and impersonate legitimacy. Governments and security teams shut down fake networks, banned risky projects, and strengthened digital defenses. The Mirai-based ShadowV2 botnet infected IoT devices across industries during an AWS outage and likely served as a test run for future attacks. ShadowV2 exploited numerous CVEs to deliver a downloader shell script that installs malware for subsequent DDoS campaigns. Another Mirai variant, RondoDox, weaponized over a dozen exploits. Attackers aim to recruit vulnerable and previously infected IoT devices into resilient botnets.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]