Powerful backdoor/rootkit found preinstalled on 3 million Android phones

Firmware that actively tries to hide itself allows attackers to install apps as root. Almost three million Android phones, many of them used by people in the US, are vulnerable to code-execution attacks that remotely seize full control of the devices, researchers said Thursday. Until recently, the flaw could have been exploited by anyone who […]

Chinese company installed secret backdoor on hundreds of thousands of phones

In “mistake,” AdUps collected data from BLU Android phones in US. Security firm Kryptowire has uncovered a backdoor in the firmware installed on low-cost Android phones, including phones from BLU Products sold online through Amazon and Best Buy. The backdoor software, initially discovered on the BLU R1 HD, sent massive amounts of personal data about the […]

Fake Cain XPii Cleaner App Is Actually a Backdoor with Very Annoying Features

If you ask any malware analyst these days, they’ll tell you they come across countless of useless or unfinished malware variants on a daily basis. One of the latest, and probably the weirdest was uncovered yesterday by GData malware analyst Karsten Hahn, who came across a fake cleaner app called CainXPiiCleaner, which exhibited some odd […]

FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE

Trojan targets desktops, not servers or IoT devices. Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks. Russian antivirus vendor Dr.Web discovered this new trojan in October. The company’s malware analysts say the trojan is spread in the form of […]

Crooks exploit a zero-day in WordPress eCommerce Plugin to upload a backdoor

Experts from the White Fir Design discovered cybe rcriminals exploited a zero-day flaw in an e-commerce plugin for WordPress to upload a backdoor. According to the experts from the firm White Fir Design, crooks exploited a zero-day flaw in an e-commerce plugin for WordPress to upload backdoors to affected websites. The plugin is WP Marketplace, a […]

Dangerous Pork Explosion backdoor found in Android Devices

Android Smartphones from Foxconn Manufacturer Plagued with Dangerous Security Flaw known as Pork Explosion. Android operating system has become quite vulnerable to hacking issues and Google has continuously been trying to fix the security flaws and make the system reliable enough for users around the world. However, despite all these efforts to patch up the […]

Spade – Android APK Backdoor Embedder

Quick and handy APK backdoor embedder with metasploit android payloads. Requirements: metasploit Installation and execution: Then you can download smap by cloning the Git repository: git clone https://github.com/suraj-root/spade.git cd spade/ ./spade.py

Malcrafted Microsoft Publisher files(PUB) Delivering backdoor Torjan?

Spam wave dropping trapped  PUB file spotted by security experts at Bitdefender. These PUB file deliver a backdoor which is capable of setting sensitive information’s from corporate information. When the victim opens the file PUB file it triggers a VBscript and downloads CAB file. PUB file –> VbScript –> AutoIt script –> Backdoor This CAB file has […]

A backdoor on Xiaomi device allows silent and remote deliver of any app

A Dutch Computer Science student discovered the presence of a backdoor that could allow an attacker to silently install any app on Xiaomi phones. A Dutch Computer Science student, Thijs Broenink, who analyzed his Xiaomi mobile device discovered the presence of a backdoor that could allow an attacker to silently install any app on the phone. The […]

Microsoft Publisher files spread backdoor to steal corporate data, Bitdefender warns

A targeted spam wave is infecting Windows computers with a backdoor capable of stealing sensitive corporate information from medium and small-sized businesses. Bitdefender antispam researchers have identified a couple of thousand emails containing .pub attachments posing as orders and invoices for products. The email senders impersonate employees from small and medium-sized businesses from the UK and […]

Mokes: This Single Malware Creates “Backdoor” In Windows, Linux, Mac OS X

Short Bytes: A cross-platform malware family has been reported by a security researcher from Kaspersky Lab. The malware can create a backdoor on Windows, Linux, and Mac OS X machines to collect data which can be transmitted to Command and Control Server over an encrypted connection. Times have gone when the term malware was familiar […]

The Missing Piece – Sophisticated OS X Backdoor Discovered

In a nutshell Backdoor.OSX.Mokes.a is the most recently discovered OS X variant of a cross-platform backdoor which is able to operate on all major operating systems (Windows,Linux,OS X). Please see also ouranalysis on the Windows and Linux variants. This malware family is able to steal various types of data from the victim’s machine (Screenshots, Audio-/Video-Captures, […]

Linux.PNScan Trojan is back to compromise routers and install backdoors

The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors on them. Yesterday I wrote about a new Linux Trojan dubbed Linux.Rex.1, a new Linux malware that is capable of self-spreading and creating a peer-to-peer botnet, now experts from Malware Must Die discovered a new strain […]

Backdoor Trojan Uses TeamViewer Components to Spy on PCs in Europe, Russia, US

Crooks also delivering keyloggers and password stealers. A new trojan called BackDoor.TeamViewerENT.1 is using parts of the legitimate TeamViewer application to allow crooks to spy on infected systems. The concept is not new by any means, and crooks employed TeamViewer in the past, when they packaged the legitimate app alongside their malware and used it to […]

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it.  This is the case with a new Hidden-Tear ransomware discovered by Michael Gillespie that impersonates a PokemonGo application for Windows and targets Arabic victims. PokemonGo Ransomware Icon On first glance, the PokemonGo ransomware infection looks like any other generic ransomware infection. It will scan […]

OMG!! Accidentally Microsoft leaked backdoor Keys to BYPASS UEFI secure boot

Keys to BYPASS UEFI secure boot Microsoft accidentally leaked the Secret keys to BYPASS UEFI secure boot that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature. Secure Boot is a security feature that protects your device from certain types of malware, such as a rootkit, which can hijack your […]

TheFatRat – Easy Tool to Generate Backdoor

Easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter reverse_tcp payload In it that can then be executed on a windows host Program to create a C program after it is compiled that will bypass most AV. Automating metasploit functions Checks for […]

Microsoft Creates Backdoor In Windows, Accidentally Leaks UEFI Secure Boot Keys

Short Bytes: Two researchers reported that Microsoft accidently compromised the golden keys to its UEFI Secure boot feature. The golden keys allow the developer to bypass the Window boot manager check and install a non-Microsoft OS on the machine. Microsft has released two patches to rectify the mistakes since then. It’s almost a week since […]