{"id":222,"date":"2024-03-05T18:26:34","date_gmt":"2024-03-05T18:26:34","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/05\/hackers-exploit-connectwise-screenconnect-flaws-to-deploy-toddlershark-malware\/"},"modified":"2024-03-05T18:26:34","modified_gmt":"2024-03-05T18:26:34","slug":"hackers-exploit-connectwise-screenconnect-flaws-to-deploy-toddlershark-malware","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/05\/hackers-exploit-connectwise-screenconnect-flaws-to-deploy-toddlershark-malware\/","title":{"rendered":"Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware"},"content":{"rendered":"<p>\u200bNorth Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called\u00a0TODDLERSHARK.<br \/>\nAccording to a report shared by Kroll with The Hacker News, TODDLERSHARK overlaps with known Kimsuky malware such as BabyShark and ReconShark.<br \/>\n\u201cThe threat actor gained access to the victim workstation by exploiting the exposed setup wizard\u00a0North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called\u00a0TODDLERSHARK.<br \/>\nAccording to a report shared by Kroll with The Hacker News, TODDLERSHARK overlaps with known Kimsuky malware such as BabyShark and ReconShark.<br \/>\n\u201cThe threat actor gained access to the victim workstation by exploiting the exposed setup wizard\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bNorth Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called\u00a0TODDLERSHARK. According to a report shared by Kroll with The Hacker News, TODDLERSHARK overlaps with known Kimsuky malware such as BabyShark and ReconShark. \u201cThe threat actor gained access to the victim workstation by exploiting the exposed&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/03\/05\/hackers-exploit-connectwise-screenconnect-flaws-to-deploy-toddlershark-malware\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":223,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/222"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=222"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/222\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/223"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}