toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

227
active users

#routersecurity

0 posts0 participants0 posts today
Offensive Sequence<p>LB-LINK routers (BL-AC1900 &amp; more, ≤20250702) face CRITICAL risk: CVE-2025-7574 allows remote, unauthenticated reboot/restore via /cgi-bin/lighttpd.cgi. Public exploit, no patch yet. Restrict access &amp; monitor! <a href="https://radar.offseq.com/threat/cve-2025-7574-improper-authentication-in-lb-link-b-84743308" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-7574-improper-authentication-in-lb-link-b-84743308</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/CVE20257574" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE20257574</span></a></p>
Offensive Sequence<p>🔎 HIGH severity (CVSS 8.7) stack buffer overflow in TOTOLINK EX1200T (4.1.2cu.5232_B20210713) via /cgi-bin/cstecgi.cgi. Public exploit code—remote takeover possible. Restrict access &amp; patch ASAP. CVE-2025-6302 <a href="https://radar.offseq.com/threat/cve-2025-6302-stack-based-buffer-overflow-in-totol-41f51869" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">radar.offseq.com/threat/cve-20</span><span class="invisible">25-6302-stack-based-buffer-overflow-in-totol-41f51869</span></a> <a href="https://infosec.exchange/tags/OffSeq" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OffSeq</span></a> <a href="https://infosec.exchange/tags/Vuln" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vuln</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a></p>
LMG Security<p>Network for Rent: How Outdated Routers Fuel Cybercrime</p><p>Old routers aren’t just risky—they’re actively powering global cybercrime and can put your organization at risk.</p><p>Malware like TheMoon is helping attackers hijack outdated routers from brands like Linksys, Cisco, and ASUS, turning them into anonymous proxies. Attackers can rent these U.S.-based IPs to bypass geofencing, IP filtering, and detection tools to bypass some of your security defenses.</p><p>Read our new blog for details and advice on how you can reduce your organization’s risk: <a href="https://www.lmgsecurity.com/network-for-rent-how-outdated-router-security-fuels-cybercrime/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">lmgsecurity.com/network-for-re</span><span class="invisible">nt-how-outdated-router-security-fuels-cybercrime/</span></a></p><p><a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/TheMoonMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheMoonMalware</span></a> <a href="https://infosec.exchange/tags/FacelessProxy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FacelessProxy</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ThreatDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatDetection</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberattack</span></a></p>
LMG Security<p>The FBI has issued an alert about cybercriminals hijacking outdated routers to power massive proxy-for-hire networks—masking malware, fraud, and credential theft right under your nose.</p><p>Watch the full Cyberside Chats episode to hear <span class="h-card" translate="no"><a href="https://infosec.exchange/@sherridavidoff" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sherridavidoff</span></a></span> and <span class="h-card" translate="no"><a href="https://infosec.exchange/@MDurrin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>MDurrin</span></a></span> 's insights on:</p><p>🔹 The FBI’s May 2025 alert<br>🔹 TheMoon malware and the Faceless proxy service<br>🔹 What these botnets mean for your enterprise<br>🔹 What you need to do now to stay protected</p><p>🎥 Watch the video: <a href="https://youtu.be/x_40BlvWsHk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/x_40BlvWsHk</span><span class="invisible"></span></a><br>🎧 Listen to the podcast: <a href="https://www.chatcyberside.com/e/outdated-routers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">chatcyberside.com/e/outdated-r</span><span class="invisible">outers-a-hidden-threat-in-your-neighborhood/?token=b0b648ff9ddf79f7cb1099945c74f7f0</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/CybersideChats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersideChats</span></a> <a href="https://infosec.exchange/tags/ProxyAbuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProxyAbuse</span></a> <a href="https://infosec.exchange/tags/TheMoonMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheMoonMalware</span></a> <a href="https://infosec.exchange/tags/Botnets" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Botnets</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkSecurity</span></a> <a href="https://infosec.exchange/tags/CISO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISO</span></a> <a href="https://infosec.exchange/tags/Cyberaware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberaware</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://infosec.exchange/tags/CIO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CIO</span></a> <a href="https://infosec.exchange/tags/SMB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMB</span></a> <a href="https://infosec.exchange/tags/Cyber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyber</span></a></p>
LavX News<p>Outdated Routers: A Gateway for Cybercriminals and Malware Attacks</p><p>The FBI has issued a stark warning regarding the security risks posed by outdated routers, particularly those no longer supported by manufacturers. As cybercriminals exploit these vulnerabilities, und...</p><p><a href="https://news.lavx.hu/article/outdated-routers-a-gateway-for-cybercriminals-and-malware-attacks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">news.lavx.hu/article/outdated-</span><span class="invisible">routers-a-gateway-for-cybercriminals-and-malware-attacks</span></a></p><p><a href="https://ioc.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a> <a href="https://ioc.exchange/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a> <a href="https://ioc.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://ioc.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://ioc.exchange/tags/TheMoonMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TheMoonMalware</span></a></p>
Alex Ivanovs<p>OVHcloud reports DDoS attacks by botnet of MikroTik core routers</p><p><a href="https://stackdiary.com/ovhcloud-reports-ddos-attacks-by-botnet-of-mikrotik-core-routers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stackdiary.com/ovhcloud-report</span><span class="invisible">s-ddos-attacks-by-botnet-of-mikrotik-core-routers/</span></a></p><p><a href="https://mastodon.social/tags/ovh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ovh</span></a> <a href="https://mastodon.social/tags/ovhcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ovhcloud</span></a> <a href="https://mastodon.social/tags/ddos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ddos</span></a> <a href="https://mastodon.social/tags/mikrotik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mikrotik</span></a> <a href="https://mastodon.social/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/networksecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networksecurity</span></a> <a href="https://mastodon.social/tags/internetsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internetsecurity</span></a> <a href="https://mastodon.social/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a> <a href="https://mastodon.social/tags/routersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>routersecurity</span></a> <a href="https://mastodon.social/tags/networkinfrastructure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkinfrastructure</span></a> <a href="https://mastodon.social/tags/DDoSprotection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoSprotection</span></a> <a href="https://mastodon.social/tags/botnet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>botnet</span></a> <a href="https://mastodon.social/tags/cyberthreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberthreats</span></a> <a href="https://mastodon.social/tags/cloudservices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudservices</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://mastodon.social/tags/internet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>internet</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>Analysis of AcidRain Malware Variant "AcidPour" and Its Impact on Ukraine</p><p><strong>Date</strong>: 19 March 2022<br><strong>CVE</strong>: Not specified <br><strong>Sources</strong>: <a href="https://www.hackread.com/acidrain-linux-malware-variant-acidpour-ukraine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackread.com/acidrain-linux-ma</span><span class="invisible">lware-variant-acidpour-ukraine/</span></a></p><p><strong>Issue Summary</strong></p><p>AcidRain, a destructive wiper malware, has been identified as a potential threat linked to the cyberattack on Viasat's KA-SAT satellite broadband service. This malware targets modems and routers, specifically designed to erase their storage contents, rendering the devices inoperable. The attack on Viasat disrupted communications across Ukraine and Europe, marking a significant cyber incident amidst the ongoing conflict between Russia and Ukraine.</p><p><strong>Technical Key findings</strong></p><p>AcidRain works by recursively deleting files and then attempting to destroy data on various storage devices, such as flash memory and SD/MMC cards, by overwriting them with up to 0x40000 bytes of data or using specific IOCTLS for erasure. This approach suggests a brute-force method, possibly indicating the attackers' desire for the tool to remain generic and reusable across different firmware. SentinelOne researchers found developmental and code overlaps with the VPNFilter malware, hinting at a connection to known Russian APT groups.</p><p><strong>Vulnerable products</strong></p><p>The attack mainly targeted satellite modems connected to the KA-SAT network, affecting thousands of modems across Europe. However, the malware's generic design suggests that it could potentially impact a wide range of routers and IoT devices with similar storage systems.</p><p><strong>Impact assessment</strong></p><p>The primary impact is the rendering of targeted modems and routers unusable, causing significant disruptions in satellite communications. This not only affects individual users but also has broader implications for organizations relying on satellite networks for their operations, including remote access to infrastructure and communications across Europe.</p><p><strong>Patches or workaround</strong></p><p>Specific patches or workarounds for AcidRain were not detailed in the sources. However, the fundamental mitigation involves securing network devices against unauthorized access and ensuring firmware is up to date to reduce vulnerabilities that could be exploited by similar malware.</p><p><strong>Tags</strong></p><p><a href="https://infosec.exchange/tags/AcidRain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AcidRain</span></a>, <a href="https://infosec.exchange/tags/AcidPour" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AcidPour</span></a>, <a href="https://infosec.exchange/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>, <a href="https://infosec.exchange/tags/ViasatAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ViasatAttack</span></a>, <a href="https://infosec.exchange/tags/VPNFilter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VPNFilter</span></a>, <a href="https://infosec.exchange/tags/WiperMalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiperMalware</span></a>, <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a>, <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a>, <a href="https://infosec.exchange/tags/ModemWiper" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ModemWiper</span></a></p>
Astra Kernel :verified:<p>Christmas tree version that we like </p><p>Credit:@CiscoNetAcad</p><p><a href="https://infosec.exchange/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://infosec.exchange/tags/NetworkAdmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkAdmin</span></a> <a href="https://infosec.exchange/tags/cisco" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cisco</span></a> <a href="https://infosec.exchange/tags/networking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networking</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/RouterSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RouterSecurity</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>