How to compromise PLC systems via stealthy Pin control attacks

At the Black Hat Europe 2016 two security researchers devised undetectable attacks that could be used to hack PLC systems avoid being detected. Security researchers at the Black Hat Europe 2016 have presented a new attack method that could be used to hack programmable logic controllers avoid being detected. programmable logic controllers are essential components for […]

Stealth Cell Tower, how to spy on workers with a harmless printer

Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for surveillance purposes. Are you angry with your boss or your colleagues? Do you want to spy on them? The engineer Julian Oliver has demonstrated how to do it with a tiny cellphone base station concealed in […]

MorphAES – IDPS, SandBox & AntiVirus STEALTH KILLER

MorphAES is the world’s first polymorphic shellcode/malware engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it’s cross-platform as well and library-independent. Properties: Polymorphism (AES encryption) Metamorphism (logic and constants changing) Platform independent (Linux/BSD/Windows) IDPS stealthing (the total number of possible signatures is more the number of atoms […]

Linux + Windows : Robolinux 8.5 LTS Arrives With Stealth VM For Running Windows

Short Bytes: Robolinux is a unique Linux distribution that comes with a stealth VM for deep Windows integration. The latest release of this operating system i.e. Robolinux 8.5 LTS “Raptor” is now available for download. This release–featuring Cinnamon, Mate, Xfce, and LXDE versions–comes with Steam for Linux client for seamless gaming. There are many Linux distributions out […]

Gcat – A stealthy Backdoor that uses Gmail as the C&C server

A stealthy Python based backdoor that uses Gmail as a command and control server. Requirements A Gmail account (Use a dedicated account! Do not use your personal one!) Turn on “Allow less secure apps” under the security settings of the account This repo contains two files: gcat.py a script that’s used to enumerate and issue […]

How to Build Stealth Backdoors

Today I’m going to tell you about a couple of techniques used to build stealth backdoors. Then, I will also show you how to detect that kind of malware and keep your systems safe. But first, a brief introduction. I started looking into this after reading a quite sensationalist article about a Linux backdoor. The […]

“Nemesis” malware hijacks PC’s boot process to gain stealth, persistence

Bootkit targeting banks and payment card processors hard to detect and remove. Malware targeting banks, payment card processors, and other financial services has found an effective way to remain largely undetected as it plucks sensitive card data out of computer memory. It hijacks the computer’s boot-up routine in a way that allows highly intrusive code […]

Stealthy malware uses Gmail drafts to steal data

A new strain of malware that uses Gmail drafts in an invisible Internet Explorer window, has been discovered. According to Network World, the malware uses the drafts folder as “the command and control to steal data.”