social.coop is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Fediverse instance for people interested in cooperative and collective projects. If you are interested in joining our community, please apply at https://join.social.coop/registration-form.html.

Administered by:

Server stats:

480
active users

#networksecurity

4 posts4 participants0 posts today

🚨 New Threat Alert: Rustobot Botnet 🚨
A new Rust-based botnet is making waves — and it's hijacking routers to do it. @FortiGuardLabs latest research dives into Rustobot, a stealthy, modular botnet that’s fast, evasive, and ready to wreak havoc.

🔍 Learn how it works, what makes it different, and how to protect your network:
👉 fortinet.com/blog/threat-resea

IOCs

URLs

hxxp://66[.]63[.]187[.]69/w.sh
hxxp://66[.]63[.]187[.]69/wget.sh
hxxp://66[.]63[.]187[.]69/t
hxxp://66[.]63[.]187[.]69/tftp.sh
hxxp://66[.]63[.]187[.]69/arm5
hxxp://66[.]63[.]187[.]69/arm6
hxxp://66[.]63[.]187[.]69/arm7
hxxp://66[.]63[.]187[.]69/mips
hxxp://66[.]63[.]187[.]69/mpsl
hxxp://66[.]63[.]187[.]69/x86

Hosts

dvrhelper[.]anondns[.]net
techsupport[.]anondns[.]net
rustbot[.]anondns[.]net
miraisucks[.]anondns[.]net
5[.]255[.]125[.]150

Edit: Shout-out to the author behind this research, @7olzu

🚨 Critical router warning for ASUS users

ASUS has disclosed a major vulnerability in routers running AiCloud, urging immediate patching to prevent remote code execution risks.

- Tracked as CVE-2025-2492
- CVSS score: 9.2 (critical)
- Affected firmware series: 3.0.0.4_382, 3.0.0.4_386, 3.0.0.4_388, 3.0.0.6_102
- Exploitable via a crafted request

If unpatched, this flaw could allow attackers to take control of affected routers remotely — exposing networks to further compromise.

ASUS has released firmware fixes and offered urgent advice:
- Update your router firmware from the official support site
- Use strong, unique passwords for Wi-Fi and router admin
- Disable AiCloud and all remote-access features if patching is not immediately possible

This issue does not affect general ASUS hardware — it is limited to certain router firmware versions with AiCloud enabled. But the severity of the bug makes it essential to act fast.

Cyber hygiene starts at the network level. A vulnerable router could be the weakest link in an otherwise secure setup.

🛡️ Always keep firmware up to date
🔒 Avoid using default or repeated passwords
🌐 Disable unnecessary services from WAN access

Before Wireshark, originally called Ethereal, packet sniffing was largely the domain of command line tools like tcpdump. Released in 1988, tcpdump gave users a raw, text based way to inspect network traffic. It was powerful, but also opaque and hard to master, especially for newcomers. You had to know exactly what you were looking for, and interpreting the data meant sifting through walls of cryptic output.

Then came Wireshark.

It brought a graphical interface to the world of packet analysis and made deep network inspection far more accessible. Users could visually follow TCP streams, filter by protocol, decode packets in real time, and dissect application level data with ease. Wireshark didn't just make packet sniffing easier, it changed how people learned networking and security. Today it is one of the most widely used tools for education, ethical hacking, malware analysis, and protocol development.

From dorm rooms to data centers, Wireshark made network hacking look good and work better.

⚠️ Over 16,000 Fortinet devices have been compromised with a stealthy symlink backdoor — even after being patched.

A report from The Shadowserver Foundation reveals that attackers left behind a persistent backdoor on FortiGate devices by abusing symbolic links. These links provide read-only access to sensitive configuration files, even after vulnerabilities were patched.

Here’s what happened:
- Threat actors exploited FortiOS zero-days throughout 2023 and 2024
- They planted symbolic links in language file folders on SSL-VPN enabled devices
- These links connected public folders to the root filesystem
- Even after patching, the symlinks gave attackers continued visibility into sensitive files

Fortinet says this isn’t due to a new vulnerability — it’s a "persistence mechanism" that evaded detection by living in user-accessible directories.

The impact:
- Over 16,000 devices globally are affected
- Attackers may have had access to configuration files, including credentials
- Fortinet is notifying affected customers and has released updated AV/IPS signatures to detect and remove the malicious symlinks

🔐 If you're using FortiGate:
- Check for recent alerts from Fortinet
- Update to the latest firmware
- Reset all credentials
- Audit logs for suspicious access behavior

At Efani, we view this as a critical reminder: patching isn’t the end of an incident — it’s the start of validation. Persistence mechanisms like this one don’t need new vulnerabilities to survive.

I'm curious to hear what others are #SelfHosting! Here's my current setup:

Hardware & OS

Infrastructure & Networking

Security & Monitoring

Authentication & Identity Management

  • Authelia (Docker): Just set this up for two-factor authentication and single sign-on. Seems to be working well so far!
  • LLDAP (Docker): Lightweight LDAP server for managing authentication. Also seems to be working pretty well!
    #AuthenticationTools #IdentityManagement

Productivity & Personal Tools

Notifications & Development Workflow

  • Notifications via: #Ntfy (Docker) and Zoho's ZeptoMail (#Zoho)
  • Development Environment: Mostly using VSCode connected to my server via Remote-SSH extension. #VSCodeRemote

Accessibility Focus ♿🖥️

Accessibility heavily influences my choices—I use a screen reader full-time (#ScreenReader), so I prioritize services usable without sight (#InclusiveDesign#DigitalAccessibility). Always open to discussing accessibility experiences or recommendations!

I've also experimented with:

  • Ollama (#Ollama): Not enough RAM on my Pi.
  • Habit trackers like Beaver Habit Tracker (#HabitTracking): Accessibility issues made it unusable for me.

I don't really have a media collection, so no Plex or Jellyfin here (#MediaServer)—but I'm always open to suggestions! I've gotten a bit addicted to exploring new self-hosted services! 😄

What's your setup like? Any cool services you'd recommend I try?

#SelfHosted #LinuxSelfHost #OpenSource #TechCommunity #FOSS #TechDIY

@selfhost @selfhosted @selfhosting

Replied in thread

@dmantis

That's a point that I've looked at for decades and just like you said; it's much worse because the audio is something that can be so extremely intrusive when it is violated and sent somewhere else

For example most of the major providers of so-called social media, have a client in which they have a clause for usage that is literally saying that they can turn on the microphone, at will, and you can't do anything about it. They obfuscuate the message by putting it in legalese

That is more than frightening

Continued thread

For some odd reason people consider it to be normal to be very very violated when it comes down to their personal privacy.

* No one should point the camera at your face without your permission.
* No one should sell you a device which has a camera pointed at your face 24 hours a day and you just accept it
* No one should sell you a device with a battery permanently sealed in it but that's another story and another storyline
* No one should ever sell you the snake oil telling you that it's normal to have a camera pointed at your face 24/7

It's not 🚫 normal!

Now go and protect your identity cover that lens!

When was the last time you've properly used the camera on your Android?

No I'm not talking about the camera which points at the scenery, I'm talking about the camera which points straight to your face 24 hours a day every time you pick your Android up.

¿Well? I'm waiting.

About 990 out of 1000 people will answer this wrong.

The only proper way of using that camera is making sure that it can only record images of your face when you absolutely want to

That means that you need to put a piece of electrical isolation tape in front of the lens of the camera and it should be like that for most of the day.

Any other manner means that you do not know anything about securing yourself and about protecting your identity.

Do you consider it normal to have a barrel of a firearm pointed at your face 24 hours a day?

The question is rhetorical

Now please follow suit and do like I have done it for decades;

The only time when the camera is pointed at me, is when I want to; if I don't I either cover it, or shove the person who puts the camera in my face in such a manner that they drop it immediately, or else!