Wednesday, March 22, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Scammers trying to sell fake PoCs for Exchange vulnerability on GitHub

Scammers trying to sell fake PoCs for Exchange vulnerability on GitHub

Cybersecurity experts pinpoint multiple accounts on GitHub trying to sell fake proofs-of-concept for Exchange vulnerabilities.


Erdem Yasar Erdem Yasar
October 7, 2022
2 min read
Scammers trying to sell fake PoCs for Exchange vulnerability on GitHub
  • Scammers are trying to sell fake proofs-of-concept on GitHub for Microsoft Exchange vulnerabilities, which are under attack.
  • Some of the account names that are trying to sell fake PoCs are: ‘jml4da’, ‘TimWallbey’, ‘Liu Zhao Khin (0daylabin)’, ‘R007er’, and ‘spher0x.’
  • The repositories include a README.md file with a link that leads to a SatoshiDisk page which includes a fake exploit for approximately $420 in bitcoins.

While Microsoft is working on a patch and cybercriminals are exploiting the Microsoft Exchange zero-day vulnerabilities, some scammers are also trying to benefit from the situation. Currently, only a small group of hackers know how these vulnerabilities can be exploited and they are not sharing this information with anyone else. Now, thousands of cybersecurity experts and threat actors are waiting for public disclosure of the vulnerability to be able to use it for their own purposes.

Fake proof-of-concept exploits

There are also scammers who are trying to gain something from this chaotic situation. A scammer is now creating GitHub repositories that claim to include fake proof-of-concept exploits for the vulnerabilities but obviously, they are fake. Huntress Lab’s John Hammond stated that there were at least 5 accounts attempting to sell the phony exploits under the names ‘jml4da’, ‘TimWallbey’, ‘Liu Zhao Khin (0daylabin)’, ‘R007er’, and ‘spher0x.’

There looks to be multiple of these, another one with a different SatoshiDisk link and "only selling FIVE copies"…. scam methinks. Multiple files to look more legitimate?

I've reported the account & repository to GitHub.

https[:]//github[.]com/TimWallbey/CVE-2022-41082-RCE https://t.co/BVvi0gtZqN pic.twitter.com/jrprZLYmct

— John Hammond (@_JohnHammond) September 30, 2022

Another scammer is trying to impersonate Kevin Beaumont, a well-known security expert, to trick people. The README.md files in the repositories only include the known information about the vulnerabilities and state that one copy of the PoC is available for sale. The link in the file leads to a SatoshiDisk page which includes a fake exploit for approximately $420 in bitcoins. The price tag is a good indicator that it is a scam attempt. A PoC for a vulnerability like this is worth hundreds of thousands of dollars easily.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: GitHubMicrosoft
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Cybercriminals using AI to create profile pictures for fake LinkedIn profiles

Cybercriminals using AI to create profile pictures for fake LinkedIn profiles

Related News

7 best cybersecurity schools

7 best cyber security schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
7 biggest data breaches in the history of the internet

7 biggest data breaches in the history of the internet

March 16, 2023 10:55 pm
The number of ransomware attacks increased by 82% in 2022

The number of ransomware attacks increased by 82% in 2022

March 14, 2023 6:45 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • 7 best cyber security schools
  • 7 oldest Linux distros that are still being maintained
  • OVHcloud purchases its first Quandela quantum computer
  • Leil Storage launches an innovative data storage solution
  • Tails 5.11 is released, download it now

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.