Posted by malvuln on Sep 28

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.Agent.aer
Vulnerability: Insecure Transit Password Disclosure
Description: The malware listens on TCP port 1080 and passes logon
credentials in plaintext via a URL query string using the HTTP GET request
Third party…
Read More – Full Disclosure

By |2021-09-28T13:18:56-04:00September 28th, 2021|