Detecting Hidden Backdoors in PHP OPcache

In this article, we will be looking at the strategies to detect and analyze malware hidden inside an OPcache file. If you haven’t read our previous article about hiding a binary webshell inside a PHP7 OPcache file, we suggest reading it before moving on. Scenario With the exploitation technique used in our last article, it […]

Viber adds end-to-end encryption and hidden chats as messaging app privacy wave grows

Following WhatsApp’s move to add end-to-end encryption to its platform, another big messaging company is joining the wave of apps turning on expanded privacy features.Viber — a messaging app with 711 million+ users — today is introducing end-to-end encryption for all messages and calls on its platform, including group chats (you can chat with up to 200 people), and a […]

Photos Show How NSA Implants Trojan In Routers For Hidden Access And Spying

ShortBytes: In a recent find out, it has been revealed how NSA implants trojan firmware in the networking devices being delivered to the targeted customers. You can also read an interesting description from an NSA manager about how it works. Ahoarded document which was fetched from the National Security Agency files released with Glenn Greenwald’s […]

PNG Embedded – Malicious payload hidden in a PNG file

One of the most complex tasks for the cybercriminals is to ensure their malicious code goes undetected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional phishing and using techniques where the malicious payload is hidden in encrypted files – even using […]

Whole lotta onions: Number of Tor hidden sites spikes—along with paranoia

What’s driving the surge in hidden services—is it government tampering? In recent weeks, the number of “hidden services”—usually Web servers and other Internet services accessible by a “.onion” address on the Tor anonymizing network—has risen dramatically. After experiencing an earlier spike in February, the number of hidden services tracked by Tor spiked to 114,000 onion addresses […]

Are Hackers Keeping a Hidden Stash on Your HP Printer’s Hard Drive?

Unprotected HP printer HDDs can be abused if not protected. Security researcher Chris Vickery has discovered that HP LaserJet printers may be abused as an anonymous data storage unit by malicious actors, thanks mainly to a default setting that sets up an FTP server via port 9100. The feature in question has its place in HP’s […]

Media devices sold to feds have hidden backdoor with sniffing functions

Highly privileged account could be used to hack customers’ networks, researchers warn. A company that supplies audio-visual and building control equipment to the US Army, the White House, and other security-conscious organizations built a deliberately concealed backdoor into dozens of its products that could possibly be used to hack or spy on users, security researchers […]

How To Unlock Google Maps’ New Hidden Driving Mode 

Short Bytes: Call it a bug or an updated feature of the Google maps, now with the updated version of Google maps, without entering the destination, Google maps will suggest you things like nearby hotels, gas stations etc. This feature has not been released publicly but it is expected to come to your mobile soon. […]

Unlock Netflix’s hidden categories with these secret codes

Here’s a trick that’s been around for a while but may have passed you by: secret category codes added by Netflix engineers that can help you narrow down your on-demand video choices. From classic war movies to Brazilian dramas, here’s how to dig deeper into the Netflix library. Whenever you dive into a genre on […]

How to Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap…), the only thing you have to do is launch a transparent proxy […]

XSS in Hidden Input Fields

At PortSwigger, we regularly run pre-release builds of Burp Suite against an internal testbed of popular web applications to make sure it’s behaving properly. Whilst doing this recently,Liam found a Cross-Site Scripting (XSS) vulnerability in [REDACTED], inside a hidden input element: <input type=”hidden” name=”redacted” value=”default” injection=”xss” /> XSS in hidden inputs is frequently very difficult […]

Chrome for Android Has a Hidden Vulnerability, Quite Simple to Exploit

Google’s Chrome staff got in contact with the security researcher and has already started working on a fix A Chinese security researcher has found a security vulnerability in Google’s Chrome browser for Android, which he recently presented during the MobilePwn2Own event at the PacSec security conference in Tokyo, as The Register is reporting. The researcher, […]

HIDDEN IN PLAIN SIGHT: BRUTE FORCING SLACK PRIVATE FILES

Last year we switched to using Slack for all our internal communication and it’s working out nicely. It’s very developer centric in that it offers integrations with lots of services like Travis CI, GitHub, etc. When we started using Slack one of our developers was sending a file, had his Developer console open and noticed […]

Malware Is Using the Dark Web to Stay Hidden

The dark web is well known as a space where anything can be bought or sold: guns, drugs, stolen data, and extreme pornography are all relatively easy to get hold of with a few clicks of a mouse. But anonymity networks such as Tor, as well as the hidden sites they facilitate, can also act […]

Intelligent system to check malware hidden in shortened Twitter URLs

Tool to check malware in Twitter URLs to be tested during European Football Championships next summer. An intelligent system has been created by computer scientists to identify malicious links disguised in shortened URLs on Twitter. Scientists were inspired to carry out further research on the problem, following a Cardiff University study that could identify potential cyber-attacks […]

Porn sites hit by malware hidden in adverts

Security firm Malwarebytes says a campaign of malware hidden inside online ads which hit search engine Yahoo earlier this year has now also appeared on adult websites. The advertising, apparently for a service called Sex Messenger, also contained tools for identifying whether the user was genuine rather than a bot. It appeared on porn site […]

Android Ransomware Hidden Behind Fake Pornography App

Android is one of the most vulnerable OS in the world — If you are an Android user you need to be careful with downloading apps. Several malicious mobile apps have been surfaced on the Internet, which is a ransomware variant that takes advantage of offering pornography as a bait for targeted victims into downloading […]

Hidden Tear – Ransomware-like file crypter

Uses AES algorithm to encrypt files. Sends encryption key to a server. Encrypted files can be decrypted in decryption program with encryption key. Creates a text file on Desktop with given message. Small file size (12 KB) Undetectable by antivirus programs (15/08/2015) Use a web server which supports scripting languages like PHP, PYTHON etc. Change this […]

Hidden password-stealing malware lurking in your GPU card? Intel Security thinks not

Fears that malware is hiding in people’s graphics chipsets may be overclocked, according to Intel Security. Earlier this year, researchers from the self-styled “Team JellyFish” released a proof-of-concept software nasty capable of exploiting GPUs to swipe passwords and other information typed in by a PC’s user. The same research raised doubts about whether security tools […]

Patched Ins0mnia Vulnerability Keeps Malicious iOS Apps Hidden

Apple’s monster security update of Aug. 13 included a patch for an iOS vulnerability that could beacon out location data and other personal information from a device, even if a particular task has been shut off by the user. A mobile app exploiting this vulnerability could also look benign enough to slip past Apple’s security […]