Posted by malvuln on Sep 28

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.Hupigon.afjk
Vulnerability: Directory Traversal
Description: The malware deploys a Web server listening on TCP port 80.
Third-party attackers who can reach an infected host can read any file on
the system using “../”…
Read More – Full Disclosure

By |2021-09-28T13:18:56-04:00September 28th, 2021|