Source |
The Hacker News |
Identifiant |
8659445 |
Date de publication |
2025-03-31 22:11:00 (vue: 2025-03-31 18:07:50) |
Titre |
Les pirates russes exploitent CVE-2025-26633 via MSC Eviltwin pour déployer Silentprism et Darkwisp Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp |
Texte |
Les acteurs de la menace derrière l'exploitation zéro-jour d'une vulnérabilité de sécurité récemment paralysée à Microsoft Windows ont été trouvés pour offrir deux nouvelles délais appelés Silentprism et Darkwisp.
L'activité a été attribuée à un groupe de piratage russe présumé appelé Water Gamayun, également connu sous le nom de Encrypthub et Larva-208.
"L'acteur de menace déploie des charges utiles principalement au moyen de
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp.
The activity has been attributed to a suspected Russian hacking group called Water Gamayun, which is also known as EncryptHub and LARVA-208.
"The threat actor deploys payloads primarily by means of |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2025 208 26633 activity actor actors also attributed backdoors been behind called cve darkwisp day deliver deploy deploys encrypthub eviltwin exploit exploitation found gamayun group hackers hacking has have known larva means microsoft msc new patched payloads primarily recently russian security silentprism suspected threat two vulnerability water which windows zero |
Tags |
Vulnerability
Threat
|
Stories |
|
Move |
|