Alibaba Cloud

Attackers Use the Vulnerability of ShowDoc to Spread Botnets

The attacker uses Python to automatically exploit the vulnerability to upload webshell, record webshell paths, and further install malicious codes for DDoS attacks and mining on the basis of webshell.

Analysis of JDWPMiner Mining Trojan: Remote Debugging with Java Causes Hidden Risks

Alibaba Cloud security experts have found that the botnet exploits the Java Debug RCE by downloading mining binary files from malicious download source files to achieve mining.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags