Aqua recently discovered a troubling trend involving Apache Tomcat servers being targeted in a new malware campaign due to misconfigurations and weak security. Over a two-year period, they recorded over 800 attacks on their Tomcat server honeypots, with a staggering 96% of these attributed to the infamous Mirai botnet. Among these attacks, 20% utilized a web shell script named "neww" from 24 distinct IP addresses. Surprisingly, 68% of these attacks originated from a single IP address, suggesting a concentrated effort by malicious actors. The objective of these attacks is to distribute the Mirai botnet malware and cryptocurrency miners, demanding immediate action to enhance Tomcat server security. The threat actor utilized a brute force approach to target Tomcat servers, attempting various credential combinations to gain unauthorized access to the web application manager. Once successful, the attackers deployed a WAR file containing a malicious web shell class called 'cmd.jsp.' This web shell granted remote control over the compromised Tomcat server, enabling them to execute arbitrary commands. Further, the final stage malware deployed is a variant of the notorious Mirai botnet, harnessing the compromised hosts for distributed denial-of-service (DDoS) attacks. This emphasizes the importance of robust security measures for web application managers to prevent unauthorized access and subsequent attacks.
Cornwell Quality Tools, a prominent supplier of automotive and industrial tools, has confirmed a significant data breach that exposed the sensitive personal information of 103,782 ...
A critical security vulnerability, CVE-2025-10127, has been discovered in the Daikin Security Gateway. The flaw is a serious industrial control systems threat, especially in the en...
On September 9, 2025, Microsoft reported four significant security vulnerabilities in the Windows Defender Firewall Service CVE-2025-53808, CVE-2025-54104, CVE-2025-54109, and CVE-...