Skip to content
  Sunday 9 November 2025
Trending
September 30, 2025In today’s fast-paced world, stress has become a common occurrence for many people. Whether it’s due to work pressures, personal relationships, or financial worries, stress can have a significant impact on our mental and physical well-being. It’s important to recognize the signs of stress and take steps to manage it effectively.<br /> <br /> One of the key ways to combat stress is through relaxation techniques such as deep breathing, meditation, or yoga. These practices can help calm the mind and body, reducing feelings of anxiety and tension. Regular exercise is also a great way to relieve stress, as physical activity releases endorphins that can improve mood and reduce stress levels.<br /> <br /> In addition to relaxation and exercise, it’s important to prioritize self-care and make time for activities that bring joy and fulfillment. Whether it’s spending time with loved ones, pursuing a hobby, or simply taking a leisurely walk in nature, finding moments of peace and happiness can help alleviate stress. Setting boundaries and learning to say no to commitments that may add to your stress can also be beneficial.<br /> <br /> Another important aspect of managing stress is maintaining a healthy lifestyle, including eating a balanced diet, getting enough sleep, and avoiding excessive alcohol and caffeine consumption. Taking care of your physical health can have a positive impact on your mental well-being and help you better cope with stress. Seeking support from friends, family, or a therapist can also be helpful in dealing with stress and building resilience.<br /> <br /> Ultimately, it’s important to remember that stress is a normal part of life, but it’s essential to find healthy ways to cope with it. By incorporating relaxation techniques, exercise, self-care, and healthy lifestyle habits into your routine, you can better manage stress and improve your overall well-being. Prioritizing your mental and physical health is key to living a balanced and fulfilling life. January 16, 2025<h3>Google Colab vs Jupyter Notebook: Discover the Key Differences</h3> December 22, 2023Cybersecurity Engineer I May 4, 2023CISA Releases One Industrial Control Systems Advisory March 24, 2025Cybersecurity Engineer Assistant April 4, 2025In today’s fast-paced world, stress has become a common experience for many people. From work deadlines to family responsibilities, it can feel like there is always something demanding our attention. However, finding ways to manage stress is crucial for our mental and physical well-being.<br /> <br /> One effective way to combat stress is through regular exercise. Physical activity has been shown to reduce levels of the body’s stress hormones, such as cortisol, while also releasing endorphins that act as natural mood lifters. Whether it’s going for a run, practicing yoga, or taking a dance class, finding a form of exercise that you enjoy can be a powerful stress reliever.<br /> <br /> Another important strategy for managing stress is practicing mindfulness and meditation. By focusing on the present moment and cultivating a sense of awareness, individuals can learn to quiet their minds and reduce feelings of anxiety and overwhelm. Taking just a few minutes each day to engage in mindfulness practices can have a significant impact on stress levels over time.<br /> <br /> In addition to exercise and mindfulness, maintaining a healthy lifestyle can also play a role in managing stress. Eating a balanced diet, getting enough sleep, and avoiding excessive alcohol and caffeine consumption can all contribute to a greater sense of well-being and resilience in the face of stressors. Taking care of our bodies can help us better cope with the challenges that life throws our way.<br /> <br /> Finally, seeking support from others can be a valuable tool in managing stress. Whether it’s talking to a friend, family member, or mental health professional, sharing our feelings and experiences can help us feel less alone and more capable of handling stress. Building a strong support network can provide us with the resources and encouragement we need to navigate life’s ups and downs with greater ease.<br /> <br /> In conclusion, stress is a natural part of life, but it doesn’t have to control us. By incorporating strategies such as exercise, mindfulness, healthy living, and seeking support, we can better manage stress and cultivate a greater sense of well-being. Taking care of ourselves both mentally and physically is essential for living a balanced and fulfilling life. March 20, 2025<h3>UK NCSC Announces 2035 Deadline for Quantum-Proof Transition</h3> April 22, 2025<h3>AI’s Phantom Packages Spark Slopsquatting Supply Chain Threat</h3> May 29, 2025<h3>Cyberattack Hits Covenant Health: Hospitals Impacted</h3> April 19, 2024Cybersecurity Analyst
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Threat Advisories  MAR-10459736.r1.v1 WHIRLPOOL Backdoor | CISA
Threat Advisories

MAR-10459736.r1.v1 WHIRLPOOL Backdoor | CISA

Mister CybersecurityMister Cybersecurity—August 18, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail


Notification

This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial product or service referenced in this bulletin or otherwise.

This document is marked TLP:CLEAR–Recipients may share this information without restriction. Sources may use TLP:CLEAR when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:CLEAR information may be shared without restriction. For more information on the Traffic Light Protocol (TLP), see http://www.cisa.gov/tlp.

Summary

Description

CISA obtained a variant of the WHIRLPOOL backdoor. The malware was used by threat actors exploiting CVE-2023-2868, a former zero-day vulnerability affecting versions 5.1.3.001-9.2.0.006 of Barracuda Email Security Gateway (ESG).

WHIRLPOOL is a backdoor that establishes a Transport Layer Security (TLS) reverse shell to the Command-and-Control (C2) server.

For information about related malware, specifically information on the initial exploit payload and other backdoors, see CISA Alert: CISA Releases Malware Analysis Reports on Barracuda Backdoors.

Download the PDF version of this report:

For a downloadable copy of IOCs associated with this MAR in JSON format, see:

Submitted Files (1)

0af253e60456b03af49cc675f71d47b2dd9a48f50a927e43b9d8116985c06459 (ssld)

Findings

0af253e60456b03af49cc675f71d47b2dd9a48f50a927e43b9d8116985c06459

Tags

trojan

Details

–>

Name ssld
Size 5034648 bytes
Type ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, BuildID[sha1]=9d3200c170c74a79f66e2c885e51519866e636eb, for GNU/Linux 3.2.0, stripped
MD5 77e1e9bf69b09ed0840534adb8258540
SHA1 deadca9bd85ee5c4e086fd81eee09407b769e9b6
SHA256 0af253e60456b03af49cc675f71d47b2dd9a48f50a927e43b9d8116985c06459
SHA512 3ad6bd00c4195c9b1757a9d697196e8beffb343c331509c2eda24bbbd009cc1af552a1900ab04d169a22d273e6359cb2ff149050a7f792b9630108a4af226e2d
ssdeep 98304:1z2EGoxipg0NPbuqbVxbNgqE+Q+F4YGZLx4BAFm/CyU:LLXYGNFLj
Entropy 6.385269
Malware Result unknown
Antivirus
ESET a variant of Linux/WhirlPool.A trojan
YARA Rules
  • rule CISA_10452108_02 : WHIRLPOOL backdoor communicates_with_c2 installs_other_components
    {
       meta:
           Author = “CISA Code & Media Analysis”
           Incident = “10452108”
           Date = “2023-06-20”
           Last_Modified = “20230804_1730”
           Actor = “n/a”
           Family = “WHIRLPOOL”
           Capabilities = “communicates-with-c2 installs-other-components”
           Malware_Type = “backdoor”
           Tool_Type = “unknown”
           Description = “Detects malicious Linux WHIRLPOOL samples”
           SHA256_1 = “83ca636253fd1eb898b244855838e2281f257bbe8ead428b69528fc50b60ae9c”
           SHA256_2 = “8849a3273e0362c45b4928375d196714224ec22cb1d2df5d029bf57349860347”
       strings:
           $s0 = { 65 72 72 6f 72 20 2d 31 20 65 78 69 74 }
           $s1 = { 63 72 65 61 74 65 20 73 6f 63 6b 65 74 20 65 72 72 6f 72 3a 20 25 73 28 65 72 72 6f 72 3a 20 25 64 29 }
           $s2 = { c7 00 20 32 3e 26 66 c7 40 04 31 00 }
           $a3 = { 70 6c 61 69 6e 5f 63 6f 6e 6e 65 63 74 }
           $a4 = { 63 6f 6e 6e 65 63 74 20 65 72 72 6f 72 3a 20 25 73 28 65 72 72 6f 72 3a 20 25 64 29 }
           $a5 = { 73 73 6c 5f 63 6f 6e 6e 65 63 74 }
       condition:
           uint32(0) == 0x464c457f and 4 of them
    }
ssdeep Matches

No matches found.

Description

The file ‘ssld’ is a Linux ELF reverse shell and is a variant of WHIRLPOOL malware used on the Barracuda Email Security Gateway (ESG) device (Figure 1). The file looks for an encoded string with a ‘.io’ extension (Figure 2). The string will be decoded and the data will be passed as the C2 which will include the Internet Protocol (IP) address and port number used to establish a reverse shell.

Screenshots

 

 

 

 

 

 

More stories

Drupal Releases Security Advisory to Address Vulnerability in Drupal Core

September 21, 2023

Siemens SIPROTEC 5 | CISA

February 14, 2025

CISA Requests for Comment on Secure Software Self-Attestation Form

April 28, 2023

CISA and FBI Release #StopRansomware: CL0P Ransomware Gang Exploits MOVEit Vulnerability

June 7, 2023

 

 

 

 

 

Figure 1. – The reverse shell component of ‘ssld’.

 

 

 

 

 

 

 

 

Figure 2. – The file ‘ssld’ looking for a string with a ‘.io’ extension.

Recommendations

CISA recommends that users and administrators consider using the following best practices to strengthen the security posture of their organization’s systems. Any configuration changes should be reviewed by system owners and administrators prior to implementation to avoid unwanted impacts.

  • Maintain up-to-date antivirus signatures and engines.
  • Keep operating system patches up-to-date.
  • Disable File and Printer sharing services. If these services are required, use strong passwords or Active Directory authentication.
  • Restrict users’ ability (permissions) to install and run unwanted software applications. Do not add users to the local administrators group unless required.
  • Enforce a strong password policy and implement regular password changes.
  • Exercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be known.
  • Enable a personal firewall on agency workstations, configured to deny unsolicited connection requests.
  • Disable unnecessary services on agency workstations and servers.
  • Scan for and remove suspicious e-mail attachments; ensure the scanned attachment is its “true file type” (i.e., the extension matches the file header).
  • Monitor users’ web browsing habits; restrict access to sites with unfavorable content.
  • Exercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).
  • Scan all software downloaded from the Internet prior to executing.
  • Maintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).

Additional information on malware incident prevention and handling can be found in National Institute of Standards and Technology (NIST) Special Publication 800-83, “Guide to Malware Incident Prevention & Handling for Desktops and Laptops”.

Contact Information

CISA continuously strives to improve its products and services. You can help by answering a very short series of questions about this product at the following URL: https://us-cert.cisa.gov/forms/feedback/

Document FAQ

What is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in a timely manner. In most instances this report will provide initial indicators for computer and network defense. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

What is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware analysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide information regarding the level of desired analysis.

Can I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to this document should be directed to the CISA at 1-888-282-0870 or CISA Service Desk.

Can I submit malware to CISA? Malware samples can be submitted via three methods:

CISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software vulnerabilities, and phishing-related scams. Reporting forms can be found on CISA’s homepage at www.cisa.gov.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

Insights Gained from the Storm 0558 Hack
Increased Attacks Targeting Zimbra Email Users for Credential Theft
Related posts
  • Related posts
  • More from author
Threat Advisories

CISA Releases Four Industrial Control Systems Advisories

November 6, 20250
Threat Advisories

ABB FLXeon Controllers | CISA

November 6, 20250
Threat Advisories

Advantech DeviceOn/iEdge | CISA

November 6, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Senior Engineer (DAST SME)

November 8, 20250
Careers

Senior Cybersecurity & Compliance Consultant

November 8, 20250
Careers

Sr. Lead Cybersecurity Architect

November 8, 20250
Careers

Cybersecurity Subject Matter/Functional Expert III

November 8, 20250
Careers

Cybersecurity Senior Data Analyst, Bureau of Audit Services

November 8, 20250
Careers

IT CYBERSECURITY SPECIALIST (CUSTSPT)

November 8, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Senior Engineer (DAST SME)
  • Senior Cybersecurity & Compliance Consultant
  • Sr. Lead Cybersecurity Architect
  • Cybersecurity Subject Matter/Functional Expert III
  • Cybersecurity Senior Data Analyst, Bureau of Audit Services

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures