BTC $105253.4219
ETH $2536.7414
XRP $2.1651
BNB $647.0731
SOL $152.2894
DOGE $0.1737
TRX $0.2723
ADA $0.6293
stETH $2531.8307
WBTC $105225.0714
HYPE $40.9323
wstETH $3063.7485
SUI $3.0141
BCH $461.0753
USDS $1.0002
LINK $13.1299
LEO $9.2628
AVAX $19.0735
XLM $0.2566
ONDO $0.7870
TON $2.9810
BTCB $105622.0912
WBT $39.4383
weETH $2714.1320
LTC $86.0318
HBAR $0.1525
WETH $2427.7112
BSC-USD $1.0051
DOT $3.7822
USDE $0.9994
XMR $311.9835
BGB $4.5146
PEPE $0.0000
PI $0.6036
AAVE $272.4915
UNI $7.0627
sUSDe $1.1822
DAI $0.9996
TAO $367.4616
OKB $51.4328
CBBTC $105258.6281
ICP $5.4192
APT $4.4910
CRO $0.0901
NEAR $2.1924
ETC $16.5423
JITOSOL $184.2161
BTC $105253.4219
ETH $2536.7414
XRP $2.1651
BNB $647.0731
SOL $152.2894
DOGE $0.1737
TRX $0.2723
ADA $0.6293
stETH $2531.8307
WBTC $105225.0714
HYPE $40.9323
wstETH $3063.7485
SUI $3.0141
BCH $461.0753
USDS $1.0002
LINK $13.1299
LEO $9.2628
AVAX $19.0735
XLM $0.2566
ONDO $0.7870
TON $2.9810
BTCB $105622.0912
WBT $39.4383
weETH $2714.1320
LTC $86.0318
HBAR $0.1525
WETH $2427.7112
BSC-USD $1.0051
DOT $3.7822
USDE $0.9994
XMR $311.9835
BGB $4.5146
PEPE $0.0000
PI $0.6036
AAVE $272.4915
UNI $7.0627
sUSDe $1.1822
DAI $0.9996
TAO $367.4616
OKB $51.4328
CBBTC $105258.6281
ICP $5.4192
APT $4.4910
CRO $0.0901
NEAR $2.1924
ETC $16.5423
JITOSOL $184.2161
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Looney Tunables are being used by Kinsing hackers to steal credentials

    The attackers changed how they usually do things, which made them even more dangerous.

    Cryptojacking hackers from the Kinsing group are now actively using Looney Tunables (CVE-2023-4911), a Linux vulnerability that was found in October, to launch attacks that get into cloud environments. This is what the cloud security company AquaSec says.

    The researchers' study is the first case of active use of Looney Tunables that has been made public. It shows how an attacker was able to get root access to the target environment.

    Someone in the new campaign is using an old PHPUnit vulnerability (CVE-2017-9841) that lets anyone run any code. Since at least 2021, Kinsing has been using this method to get into different systems for the first time.

    In the most recent attacks, hackers used a Proof of Concept (PoC) exploit in Python that was made public on October 5th by a researcher going by the name bl4sty. After this, the Kinsing hackers set off another PHP exploit, which, after being decoded, turned out to be JavaScript meant to be used for more attacks.

    Attackers could manage files, run commands, and gather information about the device using this JavaScript code as a web shell.

    The attack's main goal is to get cloud service provider credentials that can be used for further actions. This goal is different from what the Kinsing group usually does, which is to spread malware and run cryptocurrency miners.

    However, the researchers say that this could mean that the group's operations are expanding. This could mean that in the near future, their activities will become more varied and intense, which will make cloud environments more vulnerable.

     

    Author reign3d
    The hacker tool ScreenConnect is used against hospitals in the United States.
    The Middle East region has been targeted by cybercriminals employing a recently developed IronWind malware

    Comments 0

    Add comment