"92,000 D-Link NAS Devices Vulnerable to Critical Exploits"

TL;DR Summary
Two critical security flaws affecting legacy D-Link NAS devices have left as many as 92,000 devices vulnerable to malware attacks, with threat actors actively exploiting the vulnerabilities to deliver the Mirai botnet malware. D-Link has no plans to release a patch and advises customers to replace the affected devices, while the Shadowserver Foundation recommends taking the devices offline or firewalling remote access to mitigate potential threats. The findings highlight the evolving tactics of threat actors, with malware-initiated scanning attacks increasingly being used to exploit vulnerabilities in target networks.
- Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks The Hacker News
- Critical takeover vulnerabilities in 92000 D-Link devices under active exploitation Ars Technica
- Critical RCE bug in 92,000 D-Link NAS devices now exploited in attacks BleepingComputer
- 92,000+ internet-facing D-Link NAS devices accessible via "backdoor" account (CVE-2024-3273) Help Net Security
- Got an older D-Link NAS? 92000 of them are at high risk of getting hacked PCWorld
Reading Insights
Total Reads
0
Unique Readers
2
Time Saved
1 min
vs 2 min read
Condensed
77%
378 → 88 words
Want the full story? Read the original article
Read on The Hacker News