{"id":4094,"date":"2021-05-17T08:48:48","date_gmt":"2021-05-17T06:48:48","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4094"},"modified":"2024-05-15T11:39:56","modified_gmt":"2024-05-15T09:39:56","slug":"fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/","title":{"rendered":"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader&#8217;s 0-day"},"content":{"rendered":"\n<p>Welcome to the newest episode of the <a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Xopero Security Center<\/a>. What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means that most devices produced during the last 24 years are vulnerable to the attack. How severe is this new threat? To uncover this true check the whole post below.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"all-wifi-devices-impacted-by-new-fragattacks-vulnerabilities\"><strong>All Wi-Fi devices impacted by new FragAttacks vulnerabilities<\/strong><\/h2>\n\n\n<p>Newly discovered Wi-Fi security vulnerabilities collectively known as FragAttacks (fragmentation and aggregation attacks) are impacting all Wi-Fi devices manufactured in the last 24 years.<\/p>\n\n\n\n<p>Three of these bugs are Wi-Fi 802.11 standard design flaws in the frame aggregation and frame fragmentation functionalities. They are affecting most devices. Other bugs are programing mistakes in Wi-Fi products. We are not exaggerating by saying that for the most part, every Wi-Fi product is affected by at least one FragAttacks vulnerability and that most products are affected by several of them.<\/p>\n\n\n\n<p>FragAttacks vulnerabilities affect all modern security protocols of Wi-Fi, including the latest WPA3 specification. Even the WEP protocol is affected. This means that several of the newly discovered design flaws have been part of Wi-Fi since its release in 1997.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"how-do-fragattacks-strike\"><strong>How do FragAttacks strike?<\/strong><\/h5>\n\n\n<p>Attackers who are abusing design and implementation flaws have to be in the Wi-Fi range of targeted devices to steal sensitive user data and execute malicious code following successful exploitation. But potentially the full device takeover is possible.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"atbs-responsive-video\"><iframe loading=\"lazy\" title=\"FragAttacks: Demonstration of Flaws in WPA2\/3\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/88YZ4061tYw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<p>Now some good news. The design flaws are hard to abuse because doing so requires user interaction or is only possible when using uncommon network settings. However, the programming mistakes behind some of the FragAttacks vulnerabilities are trivial to exploit and would allow attackers to abuse unpatched Wi-Fi products with ease.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"fragattacks-a-herald-of-the-dark-future\"><strong>FragAttacks \u2013 a herald of the dark future?<\/strong><\/h5>\n\n\n<p>Right now vendors are developing patches for their product to mitigate the FragAttacks bugs. Cisco Systems, HPE\/Aruba Networks, Juniper Networks, Sierra Wireless, and Microsoft [1, 2, 3] have already published security updates and advisories. But what to do, if your device vendor hasn&#8217;t yet released security patches?&nbsp; You can still mitigate some of the FragAttacks<strong> <\/strong>risks. First, ensure that all websites and online services you visit use HTTPS protocol. We advise installing the HTTPS Everywhere web browser extension \u2013 it will make this task so much easier. Additionally, you can also disable fragmentation, pairwise rekeys, and dynamic fragmentation in Wi-Fi 6 (802.11ax) devices.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/all-wi-fi-devices-impacted-by-new-fragattacks-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"lemon-duck-operators-adopt-ms-exchange-server-vulnerabilities-in-new-attacks\"><strong>Lemon Duck operators adopt MS Exchange Server vulnerabilities in new attacks<\/strong><\/h2>\n\n\n<p><a href=\"https:\/\/xopero.com\/blog\/en\/bleedingtooth-the-new-critical-kernel-bluetooth-vulnerabilities\/#paragraph-3\" target=\"_blank\" rel=\"noreferrer noopener\">Lemon Duck<\/a> hacking group is becoming active again. In the last months, hackers have been using mostly SMBGhost and Eternal Blue vulnerabilities. But as the leverage of Microsoft Exchange Server flaws shows, the group&#8217;s tactics changed and now also targets devices open to the ProxyLogon attack.<\/p>\n\n\n\n<p>Lemon Duck operators use automated tools to scan, detect, and exploit servers before loading payloads such as Cobalt Strike DNS beacons and web shells, leading to the execution of cryptocurrency mining software and additional malware. The malware and associated PowerShell scripts will also attempt to remove antivirus products and will stop any services &#8211; including Windows Update and Windows Defender &#8211; that could hamper an infection attempt.&nbsp;<\/p>\n\n\n\n<p>To maintain persistence, the CertUtil command-line program is utilized to download two new PowerShell scripts tasked with removing AV products, creating persistence routines, and downloading a variant of the XMRig cryptocurrency miner.<\/p>\n\n\n\n<p>Lemon Duck has also been creating decoy top-level domains (TLDs) &#8211; rather than more generic and globally used TLDs such as &#8222;.com&#8221; or &#8222;.net&#8221; &#8211; to try and obfuscate command-and-control (C2) center infrastructure. This way, they can more effectively hide C2 communications among other web traffic present in victim environments.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/lemon-duck-hacking-group-adopts-microsoft-exchange-server-vulnerabilities-in-new-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-android-banking-trojan-teabot-found-hijacking-users-credentials-and-sms-messages\"><strong>New Android banking trojan TeaBot found hijacking users\u2019 credentials and SMS messages<\/strong><\/h2>\n\n\n<p>Researchers from the Italian fraud prevention firm Cleafy\u2019s have discovered a new Android malware targeting unsuspected users across Europe since January 2021.<\/p>\n\n\n\n<p>Dubbed TeaBot, the malware is in the early stages of development yet equipped with capabilities like remotely taking full control of a targeted device, stealing login credentials, sending and intercepting SMS messages for additional scams including extracting banking data.<\/p>\n\n\n\n<p>The rogue Android application, which masquerades as media and package delivery services like TeaTV, VLC Media Player, DHL, and UPS, acts as a dropper that not only loads a second-stage payload but also forces the victim into granting it accessibility service permissions.<\/p>\n\n\n\n<p>This malware also let its operators delete existing apps from the device, change audio settings such as muting the device, read its phone book, read the \u2018phone state\u2019 meaning attackers can identify the victim\u2019s phone number, the status of ongoing calls, current cellular network information, etc. Furthermore, TeaBot malware constantly takes screenshots of the compromised device.&nbsp;<\/p>\n\n\n\n<p>In addition, upon infecting the device TeaBot steals Google Authentication 2FA codes, compromises other accounts on the device, and last but not least it also disables the Google Play Protect feature.<\/p>\n\n\n\n<p>The collected information is then exfiltrated every 10 seconds to a remote server controlled by the attacker.<\/p>\n\n\n\n<p>So far, Cleafy\u2019s threat research team has identified more than 60 banks targeted by TeaBot malware in European countries like Italy, Spain, Germany, Belgium, and the Netherlands. The malware supports 6 different languages German, English, Italian, French, Spanish, and Dutch.<\/p>\n\n\n\n<p><strong>How to stay safe? <\/strong>Scan your phone regularly for the latest threats, install Android updates regularly, and avoid installing unnecessary apps &#8211; even from Google Play Store.<\/p>\n\n\n\n<p>Sources <a href=\"https:\/\/www.hackread.com\/teabot-android-malware-steals-data-sms\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> |&nbsp;<a href=\"https:\/\/thehackernews.com\/2021\/05\/experts-warn-of-new-android-banking.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers-target-windows-users-exploiting-a-0day-vulnerability-in-adobe-reader\"><strong>Hackers target Windows users exploiting a 0-day vulnerability in Adobe Reader<\/strong><\/h2>\n\n\n<p>Adobe is warning customers of a critical zero-day bug actively exploited in the wild that affects its ubiquitous Adobe Acrobat PDF reader software. A patch is available now and includes a roundup of 43 fixes for 12 of its products, including Adobe Creative Cloud Desktop Application, Illustrator, InDesign, and Magento.<\/p>\n\n\n\n<p>One of the issues, tracked as CVE-2021-28550, is a use-after-free memory corruption flaw that affects Adobe Reader for Windows that has been exploited in the wild. Successful exploitation could lead to arbitrary code execution.<\/p>\n\n\n\n<p>Windows users of Adobe Reader may be the only ones currently targeted. However, the bug affects eight versions of the software, including those running on Windows and macOS systems. Versions include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows Acrobat DC &amp; Reader DC (versions 2021.001.20150\u202fand\u202fearlier)<\/li><li>macOS Acrobat DC &amp; Reader DC (versions 2021.001.20149\u202fand\u202fearlier)<\/li><li>Windows &amp; macOS Acrobat 2020 &amp; Acrobat Reader 2020 (2020.001.30020 and earlier versions)<\/li><li>Windows &amp; macOS Acrobat 2017 &amp; Acrobat Reader 2017 (2017.011.30194\u202f and\u202fearlier\u202fversions)<\/li><\/ul>\n\n\n\n<p>Adobe did not provide technical details about the attacks, anyway this issue could be exploited by an attacker by tricking victims into opening specially crafted PDF.&nbsp;<\/p>\n\n\n\n<p>Users can update their product installations manually by choosing Help &gt; Check for Updates.<\/p>\n\n\n\n<p>Sources <a href=\"https:\/\/threatpost.com\/adobe-zero-day-bug-acrobat-reader\/166044\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> |&nbsp;<a href=\"https:\/\/securityaffairs.co\/wordpress\/117792\/security\/windows-zero-day-4.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-are-ten-more-cybersecurity-stories-below\"><strong>Do you have thirst for knowledge? There are ten more cybersecurity stories below<\/strong><\/h2>\n\n\n<p>1. Compsci boffin publishes proof-of-concept code for 54-year-old zero-day in Universal Turing Machine (<a href=\"https:\/\/www.theregister.com\/2021\/05\/11\/turing_machine_0day_no_patch_available\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Register<\/a>)<br>2. GitHub shifts away from passwords with security key support for SSH Git operations (<a href=\"https:\/\/www.zdnet.com\/article\/github-shifts-away-from-passwords-with-security-key-support-for-ssh-git-operations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ZDNet<\/a>)<br>3. Organizations using Microsoft 365 experience more breaches, with more severe impacts (<a href=\"https:\/\/www.helpnetsecurity.com\/2021\/05\/13\/microsoft-365-breaches\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Help Net Security<\/a>)<br>4. Apple kept mum about XcodeGhost malware attack against 128M users (<a href=\"https:\/\/www.hackread.com\/apple-xcodeghost-malware-attack-against-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HackRead<\/a>)<br>5. Exploiting common URL redirection methods to create effective phishing attacks (<a href=\"https:\/\/www.helpnetsecurity.com\/2021\/05\/10\/exploiting-url-redirection-methods\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Help Net Security<\/a>)<br>6. Shining a Light on DARKSIDE Ransomware Operations (<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2021\/05\/shining-a-light-on-darkside-ransomware-operations.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Fireeye<\/a>)<br>7. Researchers Unearth 167 Fake iOS &amp; Android Trading Apps (<a href=\"https:\/\/www.darkreading.com\/mobile\/researchers-unearth-167-fake-ios-and-android-trading-apps\/d\/d-id\/1340998\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dark Reading<\/a>)<br>8.&nbsp;Avaddon Ransomware gang hacked France-based Acer Finance and AXA Asia (<a href=\"https:\/\/securityaffairs.co\/wordpress\/117991\/cyber-crime\/avaddon-ransomware-acer-finance-axa.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>9. DarkSide ransomware call it quits after Bitcoin, servers are seized (<a href=\"https:\/\/www.hackread.com\/darkside-ransomware-quits-bitcoin-servers-seize\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Hack Read<\/a>)<br>10. QNAP warns of eCh0raix ransomware and Roon Server zero-day attacks (<a href=\"https:\/\/securityaffairs.co\/wordpress\/117943\/hacking\/qnap-ech0raix-ransomware-roon-server.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the newest episode of the Xopero Security Center. What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means that most devices produced during the last 24 years are vulnerable to the attack. How severe is this new threat? To uncover this true check the whole post below.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader&#039;s 0-day - Xopero Blog<\/title>\n<meta name=\"description\" content=\"What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader&#039;s 0-day - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T06:48:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T09:39:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"FragAttacks vulnerabilities \\\/ Lemon Duck \\\/ Trojan TeaBot \\\/ Adobe Reader&#8217;s 0-day\",\"datePublished\":\"2021-05-17T06:48:48+00:00\",\"dateModified\":\"2024-05-15T09:39:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/\"},\"wordCount\":1246,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/\",\"name\":\"FragAttacks vulnerabilities \\\/ Lemon Duck \\\/ Trojan TeaBot \\\/ Adobe Reader's 0-day - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-05-17T06:48:48+00:00\",\"dateModified\":\"2024-05-15T09:39:56+00:00\",\"description\":\"What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FragAttacks vulnerabilities \\\/ Lemon Duck \\\/ Trojan TeaBot \\\/ Adobe Reader&#8217;s 0-day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader's 0-day - Xopero Blog","description":"What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/","og_locale":"pl_PL","og_type":"article","og_title":"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader's 0-day - Xopero Blog","og_description":"What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means...","og_url":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-05-17T06:48:48+00:00","article_modified_time":"2024-05-15T09:39:56+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader&#8217;s 0-day","datePublished":"2021-05-17T06:48:48+00:00","dateModified":"2024-05-15T09:39:56+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/"},"wordCount":1246,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/","url":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/","name":"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader's 0-day - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-05-17T06:48:48+00:00","dateModified":"2024-05-15T09:39:56+00:00","description":"What is a threat of the week this time? FragAttacks vulnerabilities have been part of Wi-Fi since its release in 1997. This means...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/fragattacks-vulnerabilities-lemon-duck-trojan-teabot-adobe-readers-0-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"FragAttacks vulnerabilities \/ Lemon Duck \/ Trojan TeaBot \/ Adobe Reader&#8217;s 0-day"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4094"}],"version-history":[{"count":7,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4094\/revisions"}],"predecessor-version":[{"id":5826,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4094\/revisions\/5826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}