New EvilGnome Backdoor Implant Spies On Linux Users

Security researchers have discovered a rare piece of spyware for Linux named evilgnome, which is currently not found in all major antivirus software products and includes features that are rarely found concerning most of the malware for Linux, reports Official Hacker. It is known that in nature there are very few types of malware for […]

EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users

Security researchers have discovered a rare piece of Linux spyware that’s currently fully undetected across all major antivirus security software products, and includes rarely seen functionalities with regards to most Linux malware, The Hacker News learned. It’s a known fact that there are a very few strains of Linux malware exist in the wild as […]

Google Acknowledges Having Android Backdoor Triada

On June 6, 2019, Google released a case study of very intelligent hackers who were trying to plant backdoor in Android phones. This is about a family of apps called “Triada” that can place spam and ads on the device. After a brief overview about its beginning in 2016 and the operation of the first […]

Hacking attempt against Ubuntu source code to install a backdoor

IT systems audit experts report an alleged hacking attack against the GitHub account of Canonical Ltd, the company in charge of Ubuntu, the popular Linux distribution, allegedly with the intention of installing a backdoor. “Last July 6, the access credentials to one of the GitHub accounts owned by Canonical were compromised; those responsible for this […]

New ViceLeaker Malware Attack on Android Devices With Backdoor Capabilities to Hijack Camera, Record Audio

Researchers discovered a new malware campaign called ViceLeaker that specifically targeting the Android users with sophisticated backdoor capabilities to Hijack camera, delete files, record audio and more. Some of the Malware samples discovered by Kaspersky researchers are modified versions of an open source Jabber/XMPP client called “Conversations”  a legitimate version of the Android app available in Google […]

RKHunter – Scans Linux for Rootkits & Backdoors

Rootkit Hunter is a scanner tool for Linux that scans for backdoors, rootkits and local exploits on your systems. Installs all dependencies using apt or yum Tested on: CentOS 5.8/6.4 Debian 6.0/7.0 Fedora 17 Ubuntu 10.04/12.04/12.10 Default temp dir is /tmp/rkhunter, this can be changed in install script. By default, the installer logs into $TMP/install.log […]

Google confirms presence of Triada backdoor in cheap Android phones

Triada Banking Trojan came Preinstalled as Backdoor in Budget Android Smartphones- Google Confirms. It would probably be the first time ever in Google’s history that the company has revealed details of the tenacity and success of malware dubbed as Triada. Triada malware was discovered in 2017 and came pre-installed on Android devices. It was believed […]

Smartphone Backdoor found in Four models in Germany

Almost all mobile phones make two serious mistakes for their users: following their movements and listening to their conversations. That’s why we call it “Stalin’s dream”. Almost all phone processors have a universal back door that phones often use to transmit all the calls they hear. The back door is the result of 20-year-old mistakes […]

MuddyWater APT’s BlackWater Malware Campaign Install Backdoor on Victims PC to Gain Remote Access & Evade Detection

Researchers discovered a “Blackwater” malware campaign that suspected to associated with well known MuddyWater APT bypass the security control and install a backdoor on Victims PC using MuddyWater’s tactics, techniques, and procedures (TTPs). MuddyWater involved with a various cyber attack in recent past and its spotted to targeting organizations in Pakistan, Turkey, and Tajikistan using […]

Hackers install backdoor on Asus computers using company update

Threat actors have compromised the Asus technology manufacturer update mechanism to install malware that allows installing a backdoor on compromised computers. According to web application security testing experts, this is due to a Man-In-The-Middle (MiTM) attack campaign against routers to exploit some unsecured HTTP connections between Asus computer users and company servers. This malware, known […]

Flaw Affecting Millions of Cisco Devices Let Attackers Implant Persistent Backdoor

Researchers have discovered a severe vulnerability in Cisco products that could allow attackers to implant persistent backdoor on wide range devices used in enterprises and government networks, including routers, switches, and firewalls. Dubbed Thrangrycat or ???, the vulnerability, discovered by researchers from the security firm Red Balloon and identified as CVE-2019-1649, affects multiple Cisco products […]

LightNeuron, the backdoor designed especially for Microsoft Exchange

Reports of IICS web application penetration testing experts mentioned that a group of Russian cyber spies created one of the most advanced backdoors that have been thought to attack by an email server. The LightNeuron backdoor was specially developed to attack Microsoft Exchange email servers and, according to web application penetration testing experts, it works […]

TA505 APT Hackers Launching ServHelper Backdoor Malware via Weaponized Excel Documents

Well-Known and advanced threat actors groups TA505 APT distributing a new variant of ServHelper malware that distributed via weaponized Excel 4.0 macro to open a backdoor & steal sensitive information from infection system. TA505 threat actors associated with various high profile cyber attackers including infamous Dridex banking trojan and Locky ransomware, delivered through malicious email […]

Matebook, Huawei laptop, contains a backdoor-like vulnerability

The authors of the book ‘Learn ethical hacking’, along with specialists from the International Institute of Cyber Security (IICS), report the existence of a critical vulnerability in the Matebook laptop, developed by Huawei; according to the reports, this flaw could be exploited to take control of the compromised devices. The Chinese company has faced strong […]

ShadowHammer: Hackers Installed Backdoor On 1 Million ASUS Devices

Consumer technology vendors often advise their customers to only install updates and patches only via the official channels to make sure that the integrity of the system is maintained. But what if your PC maker’s official update utility contains malware? That’s exactly what has happened with about 1 million owners of Asus computers. First reported […]

Build your own PHP Remote Backdoor

According to ethical hacking researcher, backdoor is an malware which is used to break authentication of any computer system. Now day’s most of the backdoor attacks are increasing in organizations. Backdoor takes hidden form of the program. Backdoor can be designed & programmed easily, as it was demonstrated in ethical hacking course of International Institute […]

Asus laptops users: Don’t update your software as new update has a backdoor

According to the authors of the book ‘Learn ethical hacking’, a group of hackers has infected hundreds of thousands of Asus computers using the company’s own update tool. According to specialists from the International Institute of Cyber Security, Asus, a company based in Taiwan, is one of the leading companies supplying portable computer equipment worldwide.  […]