Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

New HTTPSnoop malware attacks telecom providers

A new cyber attack threatens the security of telecom companies with the HTTPSnoop malware

New malware called HTTPSnoop and PipeSnoop are attacking telecommunications providers in the Middle East, allowing cybercriminals to execute remote commands and compromise system security. Strengthening security measures is necessary to protect these critical infrastructures.
This pill is also available in Italian language

Recently, a group of state-sponsored cyber threats targeted telecommunications service providers in the Middle East. During the attacks, two new types of malware were employed: HTTPSnoop and PipeSnoop. These allow cybercriminals to execute remote commands on infected devices.

HTTPSnoop: Malware that interacts with Windows drivers

HTTPSnoop, leveraging kernel drivers and Windows HTTP devices, is able to execute specific content on infected devices, based on HTTP(S) URLs. This malicious program, similar to a security component of the Palo Alto Networks Cortex XDR product, is used to evade detection systems.

How HTTPSnoop works and what are its variants

HTTPSnoop decodes base64 encoded data from servers with specific URLs detected when monitoring HTTP(S) traffic on an infected device. This data is executed as shellcode on the compromised host. Furthermore, HTTPSnoop ensures that there are no collisions of URLs already configured on the server. Cisco has identified three variants of HTTPSnoop, each with different URL listening patterns.

PipeSnoop: Execute shell code through Windows pipes

Pipesnoop acts as a backdoor that executes shellcode payloads on compromised devices via Windows IPC pipes. Unlike HTTPSnoop, which appears to be aimed at public servers, Pipesnoop is better suited for operations within compromised networks. Despite this, Cisco analysts are still unable to identify the component that provides the shell code needed for Pipesnoop.

Follow us on Instagram for more pills like this

09/20/2023 19:00

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated