• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
legion malware upgraded to target ssh servers and aws credentials

Legion Malware Upgraded to Target SSH Servers and AWS Credentials

You are here: Home / General Cyber Security News / Legion Malware Upgraded to Target SSH Servers and AWS Credentials
May 24, 2023

An updated edition of the commodity malware named Legion comes with expanded functions to compromise SSH servers and Amazon Web Companies (AWS) credentials involved with DynamoDB and CloudWatch.

“This new update demonstrates a widening of scope, with new abilities these kinds of the skill to compromise SSH servers and retrieve further AWS-unique credentials from Laravel web purposes,” Cado Labs researcher Matt Muir said in a report shared with The Hacker Information.

“It is apparent that the developer’s focusing on of cloud expert services is advancing with just about every iteration.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Legion, a Python-primarily based hack device, was initial documented previous month by the cloud security business, detailing its means to breach susceptible SMTP servers in buy to harvest qualifications.

It’s also identified to exploit web servers operating information administration methods (CMS), leverage Telegram as a details exfiltration point, and send spam SMS messages to a record of dynamically-produced U.S. cell quantities by producing use of the stolen SMTP credentials.

A noteworthy addition to Legion is its means to exploit SSH servers applying the Paramiko module. It also involves features to retrieve further AWS-precise qualifications similar to DynamoDB, CloudWatch, and AWS Owl from Laravel web apps.

Upcoming WEBINARZero Rely on + Deception: Understand How to Outsmart Attackers!

Learn how Deception can detect advanced threats, cease lateral movement, and increase your Zero Belief technique. Be part of our insightful webinar!

Preserve My Seat!

A further change relates to the inclusion of more paths to enumerate for the existence of .env files these kinds of as /cron/.env, /lib/.env, /sitemaps/.env, /resources/.env, /uploads/.env, and /web/.env amid other people.

“Misconfigurations in web purposes are however the major strategy applied by Legion to retrieve credentials,” Muir mentioned.

“For that reason, it is really proposed that developers and administrators of web applications often review accessibility to sources inside of the apps them selves, and search for alternatives to storing tricks in ecosystem files.”

Located this report exciting? Abide by us on Twitter  and LinkedIn to browse much more distinctive material we submit.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «eliminating saas shadow it is now available via a free Say Goodbye to SaaS Blind Spots: Wing Security Unveils Free Discovery Toolwww.wing.securitySaaS Security / Attack SurfaceWing Security finds and ranks all SaaS applications completely for free, removing unnecessary risk.
Next Post: Backup Repositories Targeted in 93% of Ransomware Attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.