πŸ“° Betalingsbedrijf Adyen meerdere keren getroffen door cyberaanval

https://nieuwsjunkies.nl/artikel/14Jg

πŸ•‘ 01:56 | RTL Nieuws
πŸ”Έ #DDoS #Cyberaanval #Horeca #Aanval

Betalingsbedrijf Adyen meerdere keren getroffen door cyberaanval

Betaalbedrijf Adyen is gisterenavond getroffen door zeker drie ddos-aanvallen, waardoor klanten last konden hebben van betalingsproblemen in winkels, horeca of bij online winkels.

RTL Nieuws

πŸ“° Betalingsservicebedrijf Adyen tweemaal doelwit van DDos-aanval

https://nieuwsjunkies.nl/artikel/14J8

πŸ•š 23:01 | NOS Nieuws
πŸ”Έ #DDoS #Aanval

Betalingsservicebedrijf Adyen tweemaal doelwit van DDos-aanval

Het betalingsverkeer is nog niet helemaal hersteld.

DDoS-Π°Ρ‚Π°ΠΊΠΈ: ΠΎΡ‚ Ρ‚Π΅ΠΎΡ€ΠΈΠΈ ΠΊ ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΠΉ ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ΅ Π·Π°Ρ‰ΠΈΡ‚Ρ‹

ΠŸΡ€ΠΈΠ²Π΅Ρ‚! МСня Π·ΠΎΠ²ΡƒΡ‚ Максим Π Ρ‹Π±Π°Π»ΠΊΠΎ, я Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎ ΡƒΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΡŽ ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π°ΠΌΠΈ Π² Π’1 Π˜Π½Π½ΠΎΡ‚Π΅Ρ…. Π’ соврСмСнном Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΌ ΠΌΠΈΡ€Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ ΠΏΡ€Π΅Π²Ρ€Π°Ρ‚ΠΈΠ»ΠΈΡΡŒ ΠΈΠ· тСорСтичСской ΡƒΠ³Ρ€ΠΎΠ·Ρ‹ Π² Π΅ΠΆΠ΅Π΄Π½Π΅Π²Π½Ρ‹ΠΉ Π²Ρ‹Π·ΠΎΠ² для бизнСса. Π’ этой ΡΡ‚Π°Ρ‚ΡŒΠ΅ я Π½Π΅ Ρ‚ΠΎΠ»ΡŒΠΊΠΎ расскаТу ΠΎ Π±Π°Π·ΠΎΠ²Ρ‹Ρ… ΠΏΡ€ΠΈΠ½Ρ†ΠΈΠΏΠ°Ρ… Π·Π°Ρ‰ΠΈΡ‚Ρ‹, Π½ΠΎ ΠΈ подСлюсь Ρ€Π΅Π°Π»ΡŒΠ½Ρ‹ΠΌΠΈ случаями ΠΈΠ· ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠΈ, распространёнными ошибками ΠΈ тСхничСскими Ρ€Π΅ΡˆΠ΅Π½ΠΈΡΠΌΠΈ, ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΌΡ‹ примСняСм.

https://habr.com/ru/companies/T1Holding/articles/902796/

#ddos

DDoS-Π°Ρ‚Π°ΠΊΠΈ: ΠΎΡ‚ Ρ‚Π΅ΠΎΡ€ΠΈΠΈ ΠΊ ΠΊΠΎΡ€ΠΏΠΎΡ€Π°Ρ‚ΠΈΠ²Π½ΠΎΠΉ ΠΏΡ€Π°ΠΊΡ‚ΠΈΠΊΠ΅ Π·Π°Ρ‰ΠΈΡ‚Ρ‹

ΠŸΡ€ΠΈΠ²Π΅Ρ‚! МСня Π·ΠΎΠ²ΡƒΡ‚ Максим Π Ρ‹Π±Π°Π»ΠΊΠΎ, я Π΄ΠΈΡ€Π΅ΠΊΡ‚ΠΎΡ€ ΠΏΠΎ ΡƒΠΏΡ€Π°Π²Π»Π΅Π½ΠΈΡŽ ΠΏΡ€ΠΎΠ΅ΠΊΡ‚Π°ΠΌΠΈ Π² Π’1 Π˜Π½Π½ΠΎΡ‚Π΅Ρ…. Π’ соврСмСнном Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΌ ΠΌΠΈΡ€Π΅ DDoS-Π°Ρ‚Π°ΠΊΠΈ ΠΏΡ€Π΅Π²Ρ€Π°Ρ‚ΠΈΠ»ΠΈΡΡŒ ΠΈΠ· тСорСтичСской ΡƒΠ³Ρ€ΠΎΠ·Ρ‹ Π² Π΅ΠΆΠ΅Π΄Π½Π΅Π²Π½Ρ‹ΠΉ Π²Ρ‹Π·ΠΎΠ² для бизнСса. Π’ этой...

Π₯Π°Π±Ρ€

New XorDDoS Malware Allows Attackers to Create Sophisticated DDoS Bot Network

Hundreds of people have signed a petition calling for the removal of the names of two people from a list of Pembrokeshire-based Pupils, who are also known as the PPPs.

Pulse ID: 6802f9594194962b1a050c5f
Pulse Link: https://otx.alienvault.com/pulse/6802f9594194962b1a050c5f
Pulse Author: cryptocti
Created: 2025-04-19 01:16:09

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DDoS #DoS #InfoSec #Malware #OTX #OpenThreatExchange #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

From 14 to 17 April NoName057(16) group paid by the Russian πŸ‡·πŸ‡Ί regime, calling themselves hacktivists, consistently DDoSed several companies linked to Polish πŸ‡΅πŸ‡± critical infrastructure. Their attacks were successfully repelled and had absolutely no impact.
Usually, in this context, we hear about attacks that made systems and websites unavailable. It's time to change that.

#Poland
#StandWithUkraine πŸ‡ΊπŸ‡¦
#DDoS
#CyberAttack
#criticalinfrastructure
#noname
#DDOSIA

It'd be a shame if #Spanish #Hackers coordinated #DDoS attacks against government websites during #football matches. 😈
Unless you know a better way to teach the government a lesson about censorship.

🚨 A new XORDDoS Trojan campaign is targeting Linux systems globally, with U.S. orgs hit hardest. Attackers use SSH brute-force and Docker exploits, evolving C2 tactics to evade detection. Discover infection chains, persistence tricks, and actionable defense tips!

Learn more: https://zerodaily.me/blog/2025-04-18-xorddos-linux-ddos-malware-global-campaign

#CyberSecurity #Linux #Malware #DDoS #ThreatIntel #InfoSec #XORDDoS #CloudSecurity

XORDDoS Trojan: 2023–2025 Global Linux DDoS Campaigns, Evolving Infrastructure, and U.S. Targeting

A new wave of XORDDoS Trojan attacks has targeted Linux systems worldwide, with a dramatic rise in U.S. victims and evolving command-and-control infrastructure. Here’s what defenders need to know about infection vectors, persistence, and mitigation.

ZeroDaily - Cybersecurity News

Unmasking the new XorDDoS controller and infrastructure

The XorDDoS trojan, a DDoS malware targeting Linux machines, continues to spread globally with over 70% of attacks targeting the United States from Nov 2023 to Feb 2025. The operators are believed to be Chinese-speaking individuals based on language settings. A new 'VIP version' of the XorDDoS controller and central controller have been discovered, enabling more sophisticated and widespread attacks. The malware uses SSH brute-force attacks to gain access and implements persistence mechanisms. A new central controller allows threat actors to manage multiple sub-controllers simultaneously, enhancing attack coordination. The infection chain, decryption methods, and network communication patterns between the trojan, sub-controller, and central controller are analyzed in detail.

Pulse ID: 6800fccf8db6537ac15e75fb
Pulse Link: https://otx.alienvault.com/pulse/6800fccf8db6537ac15e75fb
Pulse Author: AlienVault
Created: 2025-04-17 13:06:23

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Chinese #CyberSecurity #DDoS #DoS #InfoSec #Linux #Mac #Malware #OTX #OpenThreatExchange #RAT #RCE #SMS #SSH #Trojan #Troll #UnitedStates #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Well, also there status page is down:
#spotify #statuspage
#ddos by its users

JScript to PowerShell: Breaking Down a Loader Delivering XWorm and Rhadamanthys

This analysis examines a sophisticated malware loader that utilizes JScript to launch obfuscated PowerShell code, ultimately delivering payloads such as XWorm and Rhadamanthys. The loader employs geofencing tactics, targeting victims in the United States with XWorm RAT, while deploying Rhadamanthys stealer to users outside the U.S. The attack chain involves multiple stages of obfuscation and deobfuscation, including decimal encoding and string manipulation. The final payload is injected into RegSvcs.exe using reflective loading techniques. The loader also performs various cleanup actions to evade detection and remove traces of its activity. Both XWorm and Rhadamanthys are advanced malware variants with capabilities ranging from DDoS attacks to cryptocurrency theft.

Pulse ID: 67ff46c3697a4976dc919b5d
Pulse Link: https://otx.alienvault.com/pulse/67ff46c3697a4976dc919b5d
Pulse Author: AlienVault
Created: 2025-04-16 05:57:23

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DDoS #DoS #ICS #InfoSec #Malware #OTX #OpenThreatExchange #PowerShell #RAT #Rhadamanthys #UnitedStates #Worm #XWorm #bot #cryptocurrency #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange