HOW IS MICROSOFT EXCHANGE VULNERABILITY BEING EXPLOITED BY PROMETEI POTNET?

THESECMASTER

This time attackers have been found using Prometei botnet to compromise Proxy Logon Microsoft Exchange vulnerability (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install Monero crypto-mining malware on the targets.

THESECMASTER

* What do we know about the Prometei botnet?
* What Is Proxy Logon Microsoft Exchange Vulnerability?
* Who Are The Victims Of Prometei Botnet Malware?
* Threat Actors Behind The Prometei Botnet:
* Prometei Botnet IoCs:
  * C2 Servers:
  * Files of Prometei Botnet:
  * Prometei Botnet Toolset:
* What Is The Real Motive Behind This Attack?
* How Is Microsoft Exchange Vulnerability Being Exploited By Prometei Botnet?
* Technical Details About Prometei Botnet:
* Conclusion:

Table of contents :

Watch this video to know how does cryptocurrency mining work

Continue Reading .....

Tumblr

Telegram

Medium

Twitter

LinkedIn

Facebook

FOLLOW US:

THESECMASTER