the executable installer [財['] (rather: the 7-Zip based executable
self-extractor [淫) of Rapid7's (better known for their flagship
Metasploit) ScanNowUPnP.exe loads and executes several rogue/bogus
DLLs eventually found in the directory it is started from (the
"application directory"), commonly known as "DLL hijacking".
For software downloaded with a web browser the application directory
is typically the "Downloads" directory: see
<https://insights.sei.cmu.edu/
<http://blog.acrossecurity.
and <http://seclists.org/
See the comprehensive write-up on Rapid7's community blog:
<https://community.rapid7.com/
Especially note that Rapid7 removed the now deprecated ScanNowUPnP.exe
and advises all users to remove it from any system that still has it.
stay tuned
Stefan Kanthak
[財 <http://seclists.org/
['] <http://seclists.org/bugtraq/
[淫 <http://seclists.org/bugtraq/
Komentarų nėra:
Rašyti komentarą