straycat19 Posted August 31, 2017 Share Posted August 31, 2017 Earlier this summer, a joint alert from the FBI and the US Department of Homeland Security (DHS) warned that North Korea was using a botnet infrastructure called Hidden Cobra to launch distributed denial-of-service (DDoS) attacks against systems at media, aerospace, financial companies and elements of critical infrastructure around the world. A recent alert from the US Department of Homeland Security's (DHS's) US-CERT "provides technical details on the tools and infrastructure" of Hidden Cobra. The malware could potentially spread through older, unpatched versions of Adobe Flash and Microsoft Silverlight. COMMENT - TA17-164A may be the most useful CERT advisory ever. Even if you are not technical skim through it and make the technical people tell you that have implemented the guidance within. If they try to tell you "this doesn't apply to us", ask if anyone from your organization runs, or has run, Adobe Flash or Microsoft Silverlight. CERT/FBI have given us a great starter set of signatures and crucial information, now it is up to us to implement it. CERT - Hidden Cobra Botnet Infrastructure How to Spot a North Korean Botnet Link to comment Share on other sites More sharing options...
jtmulc Posted August 31, 2017 Share Posted August 31, 2017 Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.