HOW IS MICROSOFT EXCHANGE VULNERABILITY BEING EXPLOITED BY PROMETEI POTNET?
THESECMASTER
This time attackers have been found using Prometei botnet to compromise Proxy Logon Microsoft Exchange vulnerability (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install Monero crypto-mining malware on the targets.
THESECMASTER
* What do we know about the Prometei botnet?
* What Is Proxy Logon Microsoft Exchange Vulnerability?
* Who Are The Victims Of Prometei Botnet Malware?
* Threat Actors Behind The Prometei Botnet:
* Prometei Botnet IoCs:
* C2 Servers:
* Files of Prometei Botnet:
* Prometei Botnet Toolset:
* What Is The Real Motive Behind This Attack?
* How Is Microsoft Exchange Vulnerability Being Exploited By Prometei Botnet?
* Technical Details About Prometei Botnet:
* Conclusion:
Table of contents :
Watch this video to know how does cryptocurrency mining work
Continue Reading .....
Tumblr
Telegram
Medium
Twitter
LinkedIn
Facebook
FOLLOW US:
THESECMASTER