Widespread exploitation of Cleo file transfer software (CVE-2024-50623) | Rapid7 Blog
Tags
attack-pattern: | Data Powershell - T1059.001 Server - T1583.004 Server - T1584.004 Software - T1592.002 Tool - T1588.002 Powershell - T1086 Scripting - T1064 Scripting |
Common Information
Type | Value |
---|---|
UUID | 313f566a-a6ab-41d6-883c-bbfd3eaa15fb |
Fingerprint | f9b71a56fff94e09 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Dec. 10, 2024, 2:04 p.m. |
Added to db | Dec. 10, 2024, 3:24 p.m. |
Last updated | Dec. 19, 2024, 7:31 a.m. |
Headline | Widespread exploitation of Cleo file transfer software (CVE-2024-50623) |
Title | Widespread exploitation of Cleo file transfer software (CVE-2024-50623) | Rapid7 Blog |
Detected Hints/Tags/Attributes | 24/1/3 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 50 | ✔ | Rapid7 Cybersecurity Blog | https://blog.rapid7.com/rss/ | 2024-08-30 22:08 |