Analysis malicious DLL
Because of CVE-2026-21643, a customer's FortiEMS was compromised. Users got pushed a powershell command downloading a fake patch through some obfuscation. The URL is ! careful, this is active malware ! http://83.138.53.110/FortiEMS/Endpoint-Patch.2.4.9/FortiEndpoint_Patch.2.4.9.exe It's stil
ORIGINAL SOURCE →via Reddit r/cybersecurity
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Somali terror groups could tighten Hormuz chokehold through Bab-el-Mandeb piracy, experts say
- [CYBER] Metasploitable2 - FTP Exploitation using vsftpd 2.3.4 Backdoor
- [CYBER] Copy Fail (CVE-2026-31431)
- [CYBER] Qualys TotalAI Achieves FedRAMP Moderate (FedRAMP Certified Class C) Authorization
- [CYBER] This critical Linux vulnerability is putting millions of systems at risk - how to protect yours
- [CYBER] Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations