Alias Description | Association Type | Votes |
---|---|---|
The Mirai Botnet Malware is associated with CVE-2023-1389. The Mirai botnet, a type of malware, is known for its ability to exploit vulnerabilities in various devices and systems. Mirai operates by infecting systems without the user's knowledge, often through suspicious downloads, emails, or websites. Once inside, it can steal personal information, disrupt | Unspecified | 6 |
The Mirai Malware is associated with CVE-2023-1389. Mirai, a malware that targets Internet of Things (IoT) devices, was responsible for over 7 million botnet detections in early 2022. This malicious software infiltrates systems often without the user's knowledge and can steal personal information, disrupt operations, or hold data hostage for ransom. | Unspecified | 6 |
The Condi Malware is associated with CVE-2023-1389. The Condi botnet, a form of malware, has been identified as a significant threat to unpatched TP-Link devices. The malware is recognized by the string "condi" and upon execution, sends numerous DNS queries to "trcpay[.]xyz." The botnet first attempts to resolve the Command and Control (C2) server ad | Unspecified | 5 |
The Gafgyt Variant Malware is associated with CVE-2023-1389. The Gafgyt variant is a malicious software that poses a significant threat to computer systems and devices. This malware can infiltrate your system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it has the potential to steal personal information, | Unspecified | 2 |
The Gafgyt Malware is associated with CVE-2023-1389. Gafgyt, also known as Bashlite, is a type of malware that targets Linux architecture operating systems with the primary intent to launch distributed denial of service (DDoS) attacks. This malicious software infiltrates systems often through suspicious downloads, emails, or websites, and upon entry, | Unspecified | 2 |
The Agoent Malware is associated with CVE-2023-1389. AGoent is a sophisticated malware, a malicious software designed to exploit and damage computer systems. This Golang-based agent bot has been observed in multiple attacks, exploiting a year-old vulnerability to launch various nefarious activities. It operates by fetching the script file "exec.sh" fr | Unspecified | 2 |
Preview | Source Link | CreatedAt | Title |
---|---|---|---|
InfoSecurity-magazine | 5 months ago | ||
Fortinet | 5 months ago | ||
BankInfoSecurity | 7 months ago | ||
DARKReading | 7 months ago | ||
Fortinet | 7 months ago | ||
Fortinet | 8 months ago | ||
SANS ISC | 9 months ago | ||
SANS ISC | a year ago | ||
SANS ISC | a year ago | ||
CERT-EU | a year ago | ||
Securityaffairs | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago | ||
Fortinet | a year ago | ||
CERT-EU | a year ago | ||
Securityaffairs | a year ago | ||
CERT-EU | a year ago | ||
CERT-EU | a year ago |