Posted by malvuln on Sep 28

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/9576a6a59715a69be499fa41d6383a64_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.aer
Vulnerability: Insecure Transit Password Disclosure
Description: The malware listens on TCP port 1080 and passes logon
credentials in plaintext via a URL query string using the HTTP GET request
method.
Third party…
Read More – Full Disclosure


By |2021-09-28T13:18:56-04:00September 28th, 2021|