Cybersecurity Weekly: Kupidon ransomware, WordPress attack, eCh0raix ransomware

Infosec_SamInfosec_Sam Security+, CCENT, ITIL Foundation, A+Madison, WIAdmin Posts: 527 Admin

Kupidon is the latest ransomware targeting your data. An attack targeted database credentials on 1.3 million WordPress sites. The ongoing eCh0raix ransomware campaign targets QNAP NAS devices. All this, and more, in this week’s edition of Cybersecurity Weekly.

 

1. Kupidon is the latest ransomware targeting your data

First spotted by researchers on May 9 after being uploaded to ID-Ransomware, Kupidon quickly increased distribution and victims started streaming into the ransomware identification site. This ransomware is targeting both personal users and businesses, most likely through exposed remote desktop servers.
Read more »

 

2. Attack targeted database credentials on 1.3 million WordPress sites

The attack took place between May 29 and May 31 and was stopped by the Wordfence Firewall, which blocked more than 130 million attacks. The attacks from this campaign accounted for 75 percent of all attempted exploits of plugin and theme vulnerabilities across the WordPress ecosystem.
Read more »

 

3. Ongoing eCh0raix ransomware campaign targets QNAP NAS devices

After remaining relatively quiet over the past few months, the threat actors behind the eCh0raix ransomware launched a new campaign targeting QNAP storage devices. The threat actors are gaining access to QNAP devices through known vulnerabilities or by brute-forcing weak passwords used on the device.

Read more »

For more cybersecurity news stories like these, check out the blog »


Looking for certification prep and technical skills development content? Visit our website to check out Infosec Skills! The platform has 70 learning paths, 600 courses and 150 virtual labs where you can try out new skills in a sandboxed environment. Try it free for 30 days with promo code: infoseccommunity

Try Infosec Skills »

Community Manager at Infosec!
Who we are | What we do
Sign In or Register to comment.