mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.7K
active users

#networksecurity

6 posts6 participants0 posts today

The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.

Watch the full Cyberside Chats episode to hear @sherridavidoff and @MDurrin 's insights on:

🔹 The FBI’s May 2025 alert
🔹 TheMoon malware and the Faceless proxy service
🔹 What these botnets mean for your enterprise
🔹 What you need to do now to stay protected

🎥 Watch the video: youtu.be/x_40BlvWsHk
🎧 Listen to the podcast: chatcyberside.com/e/outdated-r

Think your network is locked down? Think again.

Register for our May 28th Cyberside Chats Live episode featuring special guest @tompohl, LMG Security’s Head of Penetration Testing, and discover the most common security gaps attackers exploit.

Tom will share how his team routinely gains domain admin access in over 90% of their engagements—and how you can stop real attackers from doing the same. He’ll break down the weak points they target, from insecure default Active Directory settings to overlooked misconfigurations—even in mature environments.

Register now: lmgsecurity.com/event/cybersid

cyberside chats: live! 1
LMG SecurityCyberside Chats: Live! How Hackers Get In: Penetration Testing Secrets from the Front Lines | LMG SecurityIn this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.

⚠️ Cyber threat: Operation Moonlander dismantles a decades-old router botnet 🛡️🌙

🚫 Aging Linksys, Ericsson & Cisco routers were hijacked by TheMoon malware
👮‍♂️ Four foreign nationals indicted for running Anyproxy/5socks proxy-for-hire networks
🔒 FBI bulletin urges disposal of unsupported routers and firmware updates
🌐 Joint takedown by FBI, Dutch National Police & DOJ

Protect your network: replace EOL devices, apply patches, and monitor IoT traffic for anomalies.

#CyberSecurity #Botnet #IoT #OperationMoonlander #NetworkSecurity
theregister.com/2025/05/10/rou

The Register · Feds disrupt proxy-for-hire botnet, indict four alleged net miscreantsBy Iain Thomson

When can we declare IP Geo location / country code blocking practically dead as a mitigation strategy?

Sure it is still useful blocking script kiddies from Iran and other low hanging fruit, but do any serious APT crews actually launch attacks from their home country anymore?

With the use of zero trust, distributed attack and delivery networks (looking at you Cloudflare), and VPN usage country blocking feels less useful than in the past.

Dive into our new technical blog, No Exploits Needed: Using Cisco’s Own Features to Extract Credentials, for a behind-the-scenes look at how default settings can lead to a data breach.

In this post, Penetration Testing Team Manager @tompohl shares how he extracted a Cisco router’s entire running configuration—no credentials required—during a recent penetration test and offers tips for hardening your security. lmgsecurity.com/no-exploits-ne

press,enter,button,on,the,computer.,key,lock,security,system
LMG SecurityCisco SNMP Exploit Case Study: Internal Penetration Test Using Default Router Settings | LMG SecurityLearn how LMG Security penetration testers extracted a Cisco router’s running configuration using default SNMP settings and built-in features — no exploits required. See how internal tests uncover credential exposure and full network takeover risks.

🚨 New Threat Alert: Rustobot Botnet 🚨
A new Rust-based botnet is making waves — and it's hijacking routers to do it. @FortiGuardLabs latest research dives into Rustobot, a stealthy, modular botnet that’s fast, evasive, and ready to wreak havoc.

🔍 Learn how it works, what makes it different, and how to protect your network:
👉 fortinet.com/blog/threat-resea

IOCs

URLs

hxxp://66[.]63[.]187[.]69/w.sh
hxxp://66[.]63[.]187[.]69/wget.sh
hxxp://66[.]63[.]187[.]69/t
hxxp://66[.]63[.]187[.]69/tftp.sh
hxxp://66[.]63[.]187[.]69/arm5
hxxp://66[.]63[.]187[.]69/arm6
hxxp://66[.]63[.]187[.]69/arm7
hxxp://66[.]63[.]187[.]69/mips
hxxp://66[.]63[.]187[.]69/mpsl
hxxp://66[.]63[.]187[.]69/x86

Hosts

dvrhelper[.]anondns[.]net
techsupport[.]anondns[.]net
rustbot[.]anondns[.]net
miraisucks[.]anondns[.]net
5[.]255[.]125[.]150

Edit: Shout-out to the author behind this research, @7olzu