{"id":3216,"date":"2020-10-05T08:55:39","date_gmt":"2020-10-05T06:55:39","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3216"},"modified":"2020-10-09T13:21:05","modified_gmt":"2020-10-09T11:21:05","slug":"newest-interplanetary-storm-variant-targeting-devices-with-secure-shell","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/","title":{"rendered":"Newest InterPlanetary Storm variant targeting devices with Secure Shell"},"content":{"rendered":"\n\n\n<p>The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet &#8211; which now consists of roughly 13,500 infected machines worldwide. More about the IPS malware and ongoing campaign you can find below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-365-apt-steals-office-365-data-using-oauth2-hourslong-outage\"><strong>Microsoft 365: APT steals Office 365 data using OAuth2 \/ Hours-long outage<\/strong><\/h2>\n\n\n<p>An APT known as TA2552 has been spotted using OAuth2 or other token-based authorization methods to access Office 365 accounts, in order to steal users\u2019 contacts and mail.<\/p>\n\n\n\n<p>OAuth is an open standard for access delegation, commonly used as a way for people to sign into services without entering a password &#8211; using signed-in status on another, trusted service or website. The most visible example might be the \u201cSign in with Google\u201d or \u201cSign in with Facebook\u201d that many websites use in lieu of asking visitors to create a new account.<\/p>\n\n\n\n<p>According to researchers from Proofpoint, targets receive well-crafted lures asking them to click a link which carries them to the legitimate Microsoft third-party apps consent page.<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\"><span style=\"background-color:#f0f0f0\" class=\"tadv-background-color\"><em>\u201cOnce signed into their O365 (Office 365) account, the user is redirected to the official O365 consent process that prompts them to grant permissions to the actor\u2019s application,\u201d <\/em>they explained. <em>\u201cThe domains that catch the OAuth tokens are often registered via Namecheap and hosted on Cloudflare.\u201d<\/em><\/span><\/p>\n\n\n\n<p>In the case of this campaign, the malicious apps are asking for read-only access to the user\u2019s contacts, profile and mail \u2013 all of which could be used to snoop around accounts, silently steal data or even intercept password reset messages from other accounts, like online banking. The ability to perform reconnaissance on an O365 account supplies an actor with valuable information that can later be weaponized in business email compromise (BEC) attacks or account takeovers\u2026<\/p>\n\n\n\n<p>Proofpoint researchers said that organizations worldwide have received messages, but TA2552 seems to favor Spanish speakers. The attack campaign regularly uses messages with Mexican tax and government themes. However, it has branched out to impersonate popular consumer brands, including Netflix and Amazon Prime Mexico.&nbsp;<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"neverending-problems\">Neverending problems<\/h5>\n\n\n<p>Microsoft resolves a hours-long outage affecting its cloud services &#8211; both in the Azure Public and Azure Government clouds. The downtime started approximately at 21:25 UTC on Monday and affected users who were trying to login into its various services including Microsoft 365, Azure, Dynamics 365, as well as into other custom applications that use Azure Active Directory (AAD) authentication.<\/p>\n\n\n\n<p>\u201cUsers who were not already authenticated to the cloud services using Azure AD would have seen multiple authentication request failures. Impact was primarily in the Americas based on the issue being exacerbated by load, but users in other regions may also have experienced some impact. Users that had previously authenticated prior to the issue may not have experienced any noticeable effect,\u201d said Microsoft.<\/p>\n\n\n\n<p>The company has identified the likely culprits behind the whole situation. The root cause seems to be a combination of three separate and unrelated issues, including a code defect in a service update, a tooling error in the Azure AD safe deployment system, and a code defect in Azure AD\u2019s rollback mechanism.<\/p>\n\n\n\n<p>The situation shows that even giants such as Microsoft sometimes experience downtimes. However, this is Microsoft&#8217;s concern according to the shared responsibility model. When it comes to Office 365 information &#8211; not Microsoft but the user is responsible for data protection and should have an additional backup solution. Want some? Sign up for our beta test and get it for free!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/xopero.com\/xopero-beta-testing-community\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-en-1024x273.jpg\" alt=\"\" class=\"wp-image-3225\" width=\"642\" height=\"171\" srcset=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-en-1024x273.jpg 1024w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-en-300x80.jpg 300w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-en-768x205.jpg 768w, https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/10\/baner-beta-en.jpg 1049w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/a><\/figure><\/div>\n\n\n\n<p>Sources: <a href=\"https:\/\/threatpost.com\/oauth-phishing-microsoft-o365-attacks\/159713\/\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a> |&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/30\/microsoft-365-back-online-hours-long-outage\/\" target=\"_blank\" rel=\"noreferrer noopener\">2<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"interplanetary-storm-botnet-almost-14k-infected-machines-across-84-countries-worldwide\"><strong>InterPlanetary Storm botnet \u2013 almost 14k infected machines across 84 countries worldwide<\/strong><\/h2>\n\n\n<p>A new variant of the InterPlanetary Storm malware &#8211; in addition to Windows and Linux machines &#8211; targets Mac and Android devices. It also comes with interesting detection-evasion tactics.<\/p>\n\n\n\n<p>The malware spreads via brute force attacks on devices with Secure Shell (SSH), a cryptographic network protocol for operating network services securely over an unsecured network. It can also access an open Apple Desktop Bus (ADB) ports, which connect low-speed devices to computers.<\/p>\n\n\n\n<p>The botnet uses the implementation of libp2p, which is a network framework that allows users to write decentralized peer-to-peer (P2P) applications. This framework was originally the networking protocol of InterPlanetary File System (IPFS), on which researchers based the malware\u2019s name.<\/p>\n\n\n\n<p><strong>How to avoid detection. <\/strong>This new variant of IPS malware is able to auto-update to the latest available malware version and kill other processes on the machine that present a threat, like debuggers or competing malware (by looking at strings such as \u201crig,\u201d \u201cxig\u201d and \u201cdebug\u201d). It can also detect honeypots by looking for the string \u201csvr04\u201d in the default shell prompt.<\/p>\n\n\n\n<p>Currently there is estimated 13,500 infected machines &#8211; and that number continues to grow. Half of the infected machines are in Hong Kong, South Korea and Taiwan. Other infected systems are in Russia, Brazil, the U.S., Sweden and China. The botnet does not have clear functionality yet, but it gives its operators a backdoor into the infected devices so they can later be used for cryptomining, DDoS, or other large-scale attacks.<\/p>\n\n\n\n<p><strong>How to avoid becoming a victim.<\/strong> To avoid infection, researchers suggest end users properly configure SSH access on all devices and use a cloud security posture management tool to monitor SSH access control, eliminating any potential configuration mistakes.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/botnet-mac-android\/159714\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"61-of-microsoft-exchange-servers-still-open-to-actively-exploited-flaw-patch-now\">61% of Microsoft Exchange Servers still open to actively exploited flaw. Patch now!<\/h2>\n\n\n<p>Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable. CVE-2020-0688 is a severe bug that allows authenticated attackers to execute code remotely with system privileges. It exists in the control panel of Exchange &#8211; Microsoft\u2019s mail server and calendaring server. The flaw, which stems from the server failing to properly create unique keys at install time, was fixed as part of Microsoft\u2019s February Patch Tuesday updates \u2013 and admins in March were warned that unpatched servers are being exploited in the wild by unnamed advanced persistent threat (APT) actors.&nbsp;<\/p>\n\n\n\n<p>However, new telemetry found that out of 433,464 internet-facing Exchange servers observed, at least 61 percent of Exchange 2010, 2013, 2016 and 2019 servers are still vulnerable to the flaw.<\/p>\n\n\n\n<p>Experts recommend to determine whether Exchange has been updated and to install the update on any server with the Exchange Control Panel (ECP) enabled.<\/p>\n\n\n\n<p>With the ongoing activity, admins should also determine whether anyone has attempted to exploit the vulnerability in their environment. The exploit code that Sellers tested left log artifacts in the Windows Event Log and the IIS logs (which contain HTTP server API kernel-mode cache hits) on both patched and unpatched server: \u201cThis log entry will include the compromised user account, as well as a very long error message that includes the text invalid viewstate,\u201d said Tom Sellers with Rapid7.<\/p>\n\n\n\n<p>Admins can also review their IIS logs for requests to a path under \/ecp (usually \/ecp\/default.aspx). These should contain the string __VIEWSTATE and __VIEWSTATEGENERATOR \u2013 and will have a long string in the middle of the request that is a portion of the exploit payload.<\/p>\n\n\n\n<p>\u201cYou will see the username of the compromised account name at the end of the log entry,\u201d Sellers said. \u201cA quick review of the log entries just prior to the exploit attempt should show successful requests (HTTP code 200) to web pages under \/owa and then under \/ecp.\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/microsoft-exchange-exploited-flaw\/159669\/\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-attack-on-tyler-technologies-aftereffects-breached-networks-and-the-upcoming-united-states-election\"><strong>Ransomware attack on Tyler Technologies \u2013 after-effects, breached networks and the upcoming United States election<\/strong><\/h2>\n\n\n<p>Tyler Technologies, Inc. is the largest software provider to the United States\u2019 public sector. An important player on the market, but also one which disclosed a ransomware attack last week. As if it wasn&#8217;t serious enough, only a few days later its customers started reporting suspicious logins and previously unseen remote access tools on their networks.<\/p>\n\n\n\n<p>The ransomware attack took place on September 23, the threat actors breached the network of the company and deployed the malware. Some researchers speculate the company was infected with the RansomExx, which is a human-operated ransomware, This means that attackers manually infected the systems after gaining access to the target network. If it is correct, then there is one good piece of information. The RansomEXX ransomware does not appear to exfiltrate data before encrypting target systems.<\/p>\n\n\n\n<p>At first the company representatives declared that the incident was limited to the internal corporate network and phone systems. The cloud infrastructure was not impacted and data of customers were not affected. Further investigation revealed that attackers have had much darker intentions. Several customers were forced \u2013 after some suspicious logins to client systems were detected &#8211; to reset password as a precautionary measure.<\/p>\n\n\n\n<p><strong>What is happening there? <\/strong>Some customers reported observing new remote access software, the Bomgar client, installed on their servers. This suggests that attackers might have gained access to passwords for Tyler\u2019s web-hosted infrastructure and moved to the company\u2019s client networks.<\/p>\n\n\n\n<p><strong>Is there a bigger problem? <\/strong>The Tyler Technologies\u2019 solutions are used to display election results. U.S. intelligence agencies warned already that foreign governments might try to sow mistrust by altering sites that report votes. Why? Simply because it\u2019s easier than changing the results themselves. Disinformation is also a manipulation&#8230;<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/108899\/malware\/tyler-technologies-ransomware-attack.html\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Fake software crack sites used to push Exorcist 2.0 Ransomware (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-software-crack-sites-used-to-push-exorcist-20-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>2. Who\u2019s Behind Monday\u2019s 14-State 911 Outage? (<a href=\"https:\/\/krebsonsecurity.com\/2020\/09\/whos-behind-mondays-14-state-911-outage\/\" target=\"_blank\" rel=\"noreferrer noopener\">Krebs on Security<\/a>)<br>3. Vulnerability in Wireless Router Chipsets Prompts Advisory (<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/vulnerability-in-wireless-router-chipsets-prompts-advisory\/d\/d-id\/1339032\" target=\"_blank\" rel=\"noreferrer noopener\">Dark Reading<\/a>)<br>4. Cisco fixes actively exploited bugs in carrier-grade routers (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-fixes-actively-exploited-bugs-in-carrier-grade-routers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer)<br><\/a>5. Microsoft Office 365 Phishing Attack Uses Multiple CAPTCHAs (<a href=\"https:\/\/threatpost.com\/microsoft-office-365-captchas\/159747\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>6. These hackers have spent months hiding out in company networks undetected (<a href=\"https:\/\/www.zdnet.com\/article\/these-hackers-have-spent-months-hiding-out-in-company-networks-undetected\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<strong><br><\/strong>7. APT\u2011C\u201123 group evolves its Android spyware (<a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/30\/aptc23-group-evolves-its-android-spyware\/\" target=\"_blank\" rel=\"noreferrer noopener\">WeLiveSecurity<\/a>)<strong><br><\/strong>8. Windows XP and Server 2003 compiled from leaked source code (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/windows-xp-and-server-2003-compiled-from-leaked-source-code\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>9. Linkury adware caught distributing full-blown malware (<a href=\"https:\/\/www.zdnet.com\/article\/linkury-adware-caught-distributing-full-blown-malware\/#ftag=RSSbaffb68\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<strong><br><\/strong>10. QR Codes: A Sneaky Security Threat (<a href=\"https:\/\/threatpost.com\/qr-codes-sneaky-security-threat\/159757\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet &#8211; which now consists of roughly 13,500 infected machines worldwide. More about the IPS malware and ongoing campaign you can find below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Newest InterPlanetary Storm variant targeting devices with Secure Shell - Xopero Blog<\/title>\n<meta name=\"description\" content=\"The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Newest InterPlanetary Storm variant targeting devices with Secure Shell - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-05T06:55:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-09T11:21:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Newest InterPlanetary Storm variant targeting devices with Secure Shell\",\"datePublished\":\"2020-10-05T06:55:39+00:00\",\"dateModified\":\"2020-10-09T11:21:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/\"},\"wordCount\":1618,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/\",\"name\":\"Newest InterPlanetary Storm variant targeting devices with Secure Shell - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-10-05T06:55:39+00:00\",\"dateModified\":\"2020-10-09T11:21:05+00:00\",\"description\":\"The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Newest InterPlanetary Storm variant targeting devices with Secure Shell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Newest InterPlanetary Storm variant targeting devices with Secure Shell - Xopero Blog","description":"The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/","og_locale":"pl_PL","og_type":"article","og_title":"Newest InterPlanetary Storm variant targeting devices with Secure Shell - Xopero Blog","og_description":"The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet...","og_url":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-10-05T06:55:39+00:00","article_modified_time":"2020-10-09T11:21:05+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"8 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Newest InterPlanetary Storm variant targeting devices with Secure Shell","datePublished":"2020-10-05T06:55:39+00:00","dateModified":"2020-10-09T11:21:05+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/"},"wordCount":1618,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/","url":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/","name":"Newest InterPlanetary Storm variant targeting devices with Secure Shell - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-10-05T06:55:39+00:00","dateModified":"2020-10-09T11:21:05+00:00","description":"The cybercriminal group behind InterPlanetary Storm malware has released its new variant into the wild. The malware is building a botnet...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/newest-interplanetary-storm-variant-targeting-devices-with-secure-shell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Newest InterPlanetary Storm variant targeting devices with Secure Shell"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3216"}],"version-history":[{"count":9,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3216\/revisions"}],"predecessor-version":[{"id":3254,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3216\/revisions\/3254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}