They’ve been around since 2018, and with only two weeks notice, now are saying they need $150k?! Who the fuck is their CFO, and how did their burn rate get so out of control? Shouldn’t they have started the campaign months ago if this was an expected problem?
This just fucking reeks of embezzlement; grossly mismanaging the funds charitable individuals had entrusted them with.
Shouldn’t be this hard to find out the attack vector.
Buried deep, deep in their writeup:
RocketMQ servers
I’m sure if you’re running other insecure, public facing web servers with bad configs, the actor could exploit that too, but they didn’t provide any evidence of this happening in the wild (no threat group TTPs for initial access), so pure FUD to try to sell their security product.
Unfortunately, Ars mostly just restated verbatim what was provided by the security vendor Aqua Nautilus.