Posted by malvuln on Apr 30

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/509e3d4839688c6173980dfba22ebd55.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.ggw
Vulnerability: Authentication Bypass
Description: The malware runs a built-in FTP server listening on one of
several random TCP ports like 32335, 27227, 27942, 14223, 14988, 11092.
Third-party attackers who can reach the…
Read More – Full Disclosure


By |2021-04-30T09:18:53-04:00April 30th, 2021|