Redhotcyber<p>La botnet Mirai utilizza la vulnerabilità del router TP-Link Archer AX21 per attacchi DDoS</p><p>Gli aggressori stanno attivamente sfruttando la <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> CVE-2023-1389 nei router <a href="https://mastodon.bida.im/tags/WiFi" class="mention hashtag" rel="tag">#<span>WiFi</span></a> <a href="https://mastodon.bida.im/tags/TPLink" class="mention hashtag" rel="tag">#<span>TPLink</span></a> Archer A21 (<a href="https://mastodon.bida.im/tags/AX1800" class="mention hashtag" rel="tag">#<span>AX1800</span></a>), scoperta durante la competizione <a href="https://mastodon.bida.im/tags/Pwn2Own" class="mention hashtag" rel="tag">#<span>Pwn2Own</span></a> lo scorso dicembre. I dispositivi compromessi con successo vengono utilizzati per effettuare attacchi <a href="https://mastodon.bida.im/tags/DDoS" class="mention hashtag" rel="tag">#<span>DDoS</span></a>.</p><p>Questa <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="tag">#<span>vulnerabilità</span></a> è stata dimostrata per la prima volta al Pwn2Own Toronto 2022, quando due team separati hanno violato un dispositivo utilizzando diversi <a href="https://mastodon.bida.im/tags/approcci" class="mention hashtag" rel="tag">#<span>approcci</span></a> di <a href="https://mastodon.bida.im/tags/attacco" class="mention hashtag" rel="tag">#<span>attacco</span></a> (è stato effettuato l’accesso alle interfacce <a href="https://mastodon.bida.im/tags/LAN" class="mention hashtag" rel="tag">#<span>LAN</span></a> e <a href="https://mastodon.bida.im/tags/WAN" class="mention hashtag" rel="tag">#<span>WAN</span></a>). </p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="tag">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="tag">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="tag">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="tag">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="tag">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="tag">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="tag">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="tag">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="tag">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="tag">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="tag">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="tag">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/la-botnet-mirai-utilizza-la-vulnerabilita-del-router-tp-link-archer-ax21-per-attacchi-ddos/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/la-botnet</span><span class="invisible">-mirai-utilizza-la-vulnerabilita-del-router-tp-link-archer-ax21-per-attacchi-ddos/</span></a></p>