Prowli Malware Targeting Servers, Routers, and IoT DevicessteemCreated with Sketch.

in #tech6 years ago

prowli-malware-min.png

Dubbed Operation Prowli, the campaign has been spreading malware and injecting malicious code to take over servers and websites around the world using various attack techniques including use of exploits, password brute-forcing and abusing weak configurations.

Here's the list devices and services infected by the Prowli malware:

Drupal and WordPress CMS servers hosting popular websites
Joomla! servers running the K2 extension
Backup servers running HP Data Protector software
DSL modems
Servers with an open SSH port
PhpMyAdmin installations
NFS boxes
Servers with exposed SMB ports
Vulnerable Internet-of-Thing (IoT) devices

How to Protect Your Devices From Prowli-like Malware Attacks

Since the attackers are using a mix of known vulnerabilities and credential guessing to compromise devices, users should make sure their systems are patched and up to date and always use strong passwords for their devices.

Moreover, users should also consider locking down systems and segmenting vulnerable or hard to secure systems, in order to separate them from the rest of their network.

 TheHackerNews

Coin Marketplace

STEEM 0.27
TRX 0.21
JST 0.039
BTC 97352.82
ETH 3723.57
USDT 1.00
SBD 3.95