Threat Brief: WordPress Plugin Exploit Leads to Godzilla Web Shell, Discovery & New CVE
Below is a recent Threat Brief that we shared with our customers. Each year, we produce over 50 detailed Threat Briefs, which follow a format similar to the below. Typically, these reports include specific dates and times to provide comprehensive insights; however, please note that such information has been redacted in this public version. IOCs are available to customers within Event 27236 (uuid – fe12e833-6f0c-45c9-97d6-83337ea6c5d3).
以下是我们与客户分享的最新威胁简介。每年,我们都会制作 50 多份详细的威胁简报,其格式类似于以下。通常,这些报告包括具体的日期和时间,以提供全面的见解;但请注意,此类信息已在此公开版本中进行了编辑。 IOC 可供事件 27236 中的客户使用(uuid – fe12e833-6f0c-45c9-97d6-83337ea6c5d3)。
Recent Private Threat Briefs:
最近的私人威胁简报:
- BlackSuit Ransomware BlackSuit 勒索软件
- BlackCat Ransomware 黑猫勒索软件
- AlphV Ransomware AlphV 勒索软件
Upcoming Private Threat Briefs:
即将推出的私人威胁简报:
- 2x LockBit Black Ransomware
2x LockBit 黑色勒索软件 - LockBit 3.0 Ransomware LockBit 3.0 勒索软件
Leveraging insights from these Threat Briefs, we craft and update our Detection Ruleset, equipping you with the tools needed to identify and mitigate potential security risks efficiently. Multiple private rules were created from this report and added to our ruleset.
利用这些威胁简报的见解,我们制定和更新我们的检测规则集,为您提供有效识别和减轻潜在安全风险所需的工具。根据此报告创建了多个私有规则并将其添加到我们的规则集中。
Contact us for a personalized demo of our services via the Contact Us page.
通过“联系我们”页面联系我们,获取我们服务的个性化演示。
原文始发于thedfirreport:Threat Brief: WordPress Plugin Exploit Leads to Godzilla Web Shell, Discovery & New CVE
转载请注明:Threat Brief: WordPress Plugin Exploit Leads to Godzilla Web Shell, Discovery & New CVE | CTF导航