{"id":8722,"date":"2024-07-04T15:33:16","date_gmt":"2024-07-04T06:33:16","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8722"},"modified":"2025-01-20T15:34:04","modified_gmt":"2025-01-20T06:34:04","slug":"attack-cases-against-http-file-server-hfs-cve-2024-23692","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/attack-cases-against-http-file-server-hfs-cve-2024-23692\/","title":{"rendered":"Attack Cases Against HTTP File Server (HFS) (CVE-2024-23692)"},"content":{"rendered":"\n<p>Researchers have discovered ongoing exploitation of a critical vulnerability in the HTTP File Server (HFS) that is being used to deploy cryptocurrency mining malware, Remote Access Trojans (RATs), backdoors, and infostealers.<br>This vulnerability, identified as CVE-2024-23692, impacts the Rejetto HTTP File Server (HFS), a software that enables file sharing through a web browser using only an executable file, bypassing the need for a traditional web server. Its simplicity has made it a popular choice for users seeking an easy way to share files.<br>However, because HFS is publicly accessible to allow user connections, it becomes a prime target for external attacks if vulnerabilities are present. This exposure underscores the importance of quickly addressing issues like CVE-2024-23692 to prevent malicious exploitation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have discovered ongoing exploitation of a critical vulnerability in the HTTP File Server (HFS) that is being used to deploy cryptocurrency mining malware, Remote Access Trojans (RATs), backdoors, and infostealers.This vulnerability, identified as CVE-2024-23692, impacts the Rejetto HTTP File Server (HFS), a software that enables file sharing through a web browser using only an executable file, bypassing the need<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8725,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[220,12,9,2,1],"tags":[],"class_list":["post-8722","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government-advisory","category-read_article","category-ransomware_criminals","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2025\/01\/programming-background-collage_23-2149901792.jpg?fit=1380%2C920&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8722"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8722"}],"version-history":[{"count":1,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8722\/revisions"}],"predecessor-version":[{"id":8727,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8722\/revisions\/8727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8725"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}