Xopero Blog

FlixOnline – if you too have this app installed, delete it now

A promise of two months Premium Netflix subscription free of charge and there will always be someone willing to save some money. But in this case, some people got surprised with hijacked WhatsApp and stolen credit card data. While most of our readers were probably smart enough to avoid the FlixOnline app, we can see that this scam is totally working on many people. Everything in this campaign was designed to confuse and get them to believe they are getting free Netflix for real. Word of advice: there is no easy way to get Netflix for free.. Or HBO Max, Disney Plus or anything else.

Read more

Bugs in VMware vRealize Operations platform make RCE and admin’s credentials theft possible

Welcome to the next episode of the Xopero Security Center. Stealing admin credentials or gaining access to the platform capable of managing IT operations in various cloud deployments, allowing admins to monitor the health and capacity of virtual environments is a serious security breach. And these black scenarios become more than possible thanks to two newly discovered [and patched] vulnerabilities in VMware vRealize Operations platform. How severe is this new threat? To uncover this true check the whole post below.

Read more

Bitbucket security – best practices

For some businesses, especially those for which code is the most critical resource, the security of the code hosting and version control service might be a key decision factor. There are three main such services on the market – GitHub, Bitbucket, GitLab. In this article, we will take a closer look at Bitbucket security.

Read more

Purple Fox malware has gained new and alarming worm capabilities

Welcome to the next episode of the Xopero Security Center. This week we are taking a break from MS Exchange and ProxyLogon vulnerabilities. Maybe except this small update: according to Microsoft, 92% of vulnerable Exchange servers are now patched or mitigated. But Microsoft’s ecosystems are profitable targets and attackers take advantage of newer vulnerabilities to infect systems over and over again. Thus, this time we are taking a closer look into an upgraded variant of Purple Fox malware with worm capabilities that targets Microsoft Windows machines. Which one exactly? To find out more, read the full post.

Read more

Microsoft releases a one-click ProxyLogon mitigation tool

Welcome to the next episode of the Xopero Security Center. Race against time – that’s the best description of the ProxyLogon situation. First Microsoft has released emergency patches for vulnerable systems. No more than a week later researchers spotted the first ransomware actively exploiting these vulnerabilities. Now users got a one-click ProxyLogon mitigation tool (details below). The keyword is „mitigation” – it mitigates the risk of exploit until the update will be applied. This is not an alternative. The good news – tens of thousands of Microsoft Exchange servers have been patched already. Experts have never seen patch rates this high for any system before. Still, there are about 82k devices vulnerable to the attack. Hence the new tool. Need to find out more? Check the rest of the article.

Read more

Git Repository Backup: third-party software or your own script

When it comes to files, endpoints, servers, or VMs – a third-party backup software is something obvious that nearly every business needs and should have. Unlike repository backup which is not so obvious, but of equal importance. As CTO, IT manager, software-house owner, or team leader – you probably can imagine how much it would cost you to lose the code your team has been working on for months… if not, try to calculate…

Read more

Z0Miner malware / DearCry ransomware and ProxyLogon exploits / reCAPTCHA phishing

Welcome to the next episode of the Xopero Security Center. This time we are taking a closer look into the Z0Miner malware case – a new threat against unpatched ElasticSearch and Jenkins servers. MS Exchange servers are under attack too. Remember the four new zero-day vulnerabilities discovered a few weeks ago? They have got a fancy name now – ProxyLogon exploits – and very effective [DearCry] ransomware which is targeting vulnerable devices. What’s next? There is also a novel phishing attack that uses fake Google reCAPTCHA to swipe Microsoft 365 credentials. There were also some problems with the GitHub logging mechanism. Details can be found below.

Read more

Microsoft 365 security – anti-malware protection

Malware is the most common threat that can compromise your Microsoft 365 security system. Do you know that each year there are approximately 10 billions malware attacks? Malware is a very broad concept including such treats as viruses, trojans, rootkits, worms, spyware, and other malicious software. What are the effects of such threats? Well, data breach/loss and related costs (which are astronomical, by the way), reputation loss, downtime, legal penalties and much more… In this article I will talk about the Microsoft 365 security in terms of anti-malware protection inside Microsoft 365 services.

Read more