
AppSec News Roundup for January 2019: WebStresser, Mirai, reCAPTCHA, and more
Application security news never stops, and it can be hard to follow all of the incidents that are #AppSec related. In this roundup, I've picked a handful of the most significant news items from January 2019.
Credential Stuffing Attacks are increasing, and free raw material is abundant

A “megabreach” was also discovered this month. As with most such “megabreach” credential dumps, this one seems to be a merged list of multiple older breaches, with a few million newer credentials in the mix.
Troy Hunt’s HaveIBeenPwned has integrated this list, in case you want to check on your credentials.
The UK government is working with several other nations to track and apprehend WebStresser users

This latest action is part of Operation Power Off, which pursues those individuals and services responsible for committing or facilitating DDoS (Distributed Denial of Service) attacks.
Mirai is back with as a new variant primarily exploiting a ThinkPHP vulnerability
The Mirai bot is back as a new variant called Yowai. Cybercriminals use websites created using the PHP framework to breach web servers via dictionary attacks on default credentials and gain control of these routers for distributed denial of service attacks. Here's SC Media how Hakai and Yowai botnets work:
Once the Yowai botnet infects the router it uses dictionary attack in an attempt to infect other devices while the affected router becomes part of a botnet that enables its operator to use the affected devices for launching DDoS attacks.
Mirai is a piece of malware that turns IoT devices into a network that can be controlled by a central administrator. Here's more from CSO on the original Mirai Botnet.
Automated attacks against 2FA implementations and reCATPCHA bypass PoC’s

A Polish researcher, Piotr Duszyński, released Modlishka, a tool that acts as a reverse proxy. Modlishka sits between the user and website, and proxies all the traffic to the website. The victim receives authentic content from the legitimate site --let's say for example Google-- but all traffic and all the victim's interactions with the legitimate site passes through and is recorded on the Modlishka server.
A group of MIT researchers released unCaptcha v2, a tool that can defeat reCAPTCHA with 90% accuracy. This was an update to the original unCaptcha tool. The tool is built to defeat reCAPTCHA by using the audio captcha feature – it downloads the audio captcha and runs it through multiple online speech-to-text services, processes the resulting output and uses the output to solve the CAPTCHA.
Get protection for websites and applications from cyber-threats with the Barracuda Web Application Firewall. Visit our corporate site here to learn more and get a free 30-day trial.

Informe de Barracuda sobre Ransomware 2025
Principales conclusiones sobre la experiencia y el impacto del ransomware en las organizaciones de todo el mundo
Suscríbase al blog de Barracuda.
Regístrese para recibir Threat Spotlight, comentarios de la industria y más.

Seguridad de vulnerabilidades gestionada: corrección más rápida, menos riesgos, cumplimiento normativo más fácil
Descubra lo fácil que es encontrar las vulnerabilidades que los ciberdelincuentes quieren explotar.