After the “Hello, Peppa!” zero-day botnet, our Attack Vector Miner detected another zero-day vulnerability. Some vulnerable websites contain an /ept/out.php file, which can work as an open proxy. That’s why the attacker scans the /ept/out.php file. Let’s see an example: The number of these attacks started to increase on July 11th, and as we can see in the diagram below, the botnet’s activity is slowing down […]
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.