Source |
Security Affairs |
Identifiant |
3507826 |
Date de publication |
2021-10-13 07:26:48 (vue: 2021-10-13 08:06:11) |
Titre |
Chinese APT IronHusky use Win zero-day in recent wave of attacks (Recyclage) |
Texte |
A Chinese-speaking hacking group exploited a Windows zero-day vulnerability in a wave of attacks on defense and IT businesses. A Chinese-speaking hacking group exploited a zero-day vulnerability in the Windows Win32k kernel driver to deploy a new remote access trojan (RAT), tracked as MysterySnail. The attacks were conducted between late August and early September 2021 […]
|
Notes |
|
Envoyé |
Oui |
Condensat |
2021 access apt attacks august between businesses chinese conducted day defense deploy driver early exploited group hacking ironhusky kernel late mysterysnail new rat recent remote september speaking tracked trojan use vulnerability wave win win32k windows zero |
Tags |
Vulnerability
|
Stories |
|
Move |
|
Source |
Bleeping Computer |
Identifiant |
3505415 |
Date de publication |
2021-10-12 14:01:37 (vue: 2021-10-12 18:05:33) |
Titre |
Chinese hackers use Windows zero-day to attack defense, IT firms |
Texte |
A Chinese-speaking hacking group exploited a zero-day vulnerability in the Windows Win32k kernel driver to deploy a previously unknown remote access trojan (RAT). [...] |
Notes |
|
Envoyé |
Oui |
Condensat |
access attack chinese day defense deploy driver exploited firms group hackers hacking kernel previously rat remote speaking trojan unknown use vulnerability win32k windows zero |
Tags |
Vulnerability
|
Stories |
|
Move |
|