Strike Database
Important Information
On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.
CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.
For details, click here.
Displaying 148021 - 148036 of 148036
This strike sends a polymorphic malware sample known as QuasarRAT. In Oct 2021 Cisco Talos detected a campaign targeting Afghanistan and India utilizing malicious RTF documents to deliver malware to its victims. This campaign used CVE-2017-11882, a vulnerability in Microsoft Office, to deliver QuasarRAT and dcRAT to Windows and AndroidRAT to mobile devices. This sample is QuasarRAT.The binary has...
The sample has been identified as being associated with the 'SLocker' family of malware. The sample targets Android platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2018-07-05.
The sample has been identified as being associated with the 'SpyEye' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2018-08-31.
The sample has been identified as being associated with the 'Faketoken' family of malware. The sample targets Android platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2018-10-29.
CVSS: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
This strike exploits a vulnerability in the Atlassian JIRA software suite. It allows a remote unauthenticated attacker to upload a file to random location on the file system by exploiting a directory traversal vulnerability. All versions of JIRA prior to 6.0.3 are vulnerable.
The sample has been identified as being associated with the 'Shifu' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2022-01-27.
CVSS: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)
This strike exploits a Memory Corruption vulnerability in Mozilla Firefox. The vulnerability is due to error while handling first-letter pseudo elements. An attacker could exploit this vulnerabilty by enticing a user to view a malicious web page, executing arbitrary code on the victim machine.
The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2019-04-29.
The sample has been identified as being associated with the 'ZeGhost' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2019-06-26.
CVSS: 2.1 (AV:L/AC:L/Au:N/C:N/I:P/A:N)
A vulnerability exists in PHPs handling of the Content-Disposition MIME header. An attacker could control the location of an uploaded file by supplying an arbitrary file name and path through this header. It is possible to exploit this vulnerability and upload a malicious file to an arbitrary location on the vulnerable system, possibly leading to arbitrary code execution. If the vulnerability is...
The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-01-12.
The sample has been identified as being associated with the 'Zbot' family of malware. The sample targets Win32 platforms. The sample is categorized as 'financial'. The sample was first seen in the wild on 2018-12-26.
The sample has been identified as being associated with the 'ChewBacca' family of malware. The sample targets Win32 platforms. The sample is categorized as 'retail'. The sample was first seen in the wild on 2019-02-20.
The sample has been identified as being associated with the 'Disttrack' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-06-23.
The sample has been identified as being associated with the 'Sakurel' family of malware. The sample targets Win32 platforms. The sample is categorized as 'apt'. The sample was first seen in the wild on 2022-03-16.
The sample has been identified as being associated with the 'Virlock' family of malware. The sample targets Win32 platforms. The sample is categorized as 'ransomware'. The sample was first seen in the wild on 2022-05-04.