The China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor called MQsTTang as part of an ongoing social...
An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously undocumented backdoor in a Windows logo in...
An advanced persistent threat group with links to Iran has updated its malware toolset to include a novel PowerShell-based implant called PowerLess...
An Iranian state-sponsored actor has been observed scanning and attempting to abuse the Log4Shell flaw in publicly-exposed Java applications to deploy a...
Avast Threat Intelligence Team stated that it tried to notify the agency about the intrusion but didn’t receive any favorable response, which...
The backdoors were detected during penetration testing by RedTeam Pentesting GmbH. On December 20th, it was reported that a backdoor was found...
A U.S. federal government commission associated with international rights has been targeted by a backdoor that reportedly compromised its internal network in...
Researchers believe that the campaign has been active since 2018, and since then, the malware has been under development constantly. Cisco Talos...
A newly discovered botnet capable of staging distributed denial-of-service (DDoS) attacks targeted unpatched Ribbon Communications (formerly Edgewater Networks) EdgeMarc appliances belonging to...
Microsoft has warned of a new FoggyWeb backdoor being used by Nobelium, the same state-sponsored hacking group believed to be responsible for...
Some fake piracy websites have also been found distributing Crypto Bot and Raccoon Stealer malware in cracked software. Sophos Labs’ security researchers...
According to researchers, the PRISM backdoor has been on their radar for more than 3.5 years. Security researchers at AT&T Labs have...
A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely...
A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a...
A threat actor believed to be working on behalf of Chinese state-sponsored interests was recently observed targeting a Russia-based defense contractor involved...
New RotaJakiro Stealthy Linux Malware With System Backdoor Capabilities Went Unnoticed for 3 Years. Qihoo 360’s Network Security Research Lab, aka 360...
Microsoft and cybersecurity firm FireEye has identified three new malware used by SolarWinds hackers in their last year’s attack on highly critical...
Dubbed Purple Lambert by Kaspersky; the malware passively listens to network traffic and search for a “magic packet.” The Global Research and...
CDK is an open-sourced container penetration toolkit, designed for offering stable exploitation in different slimmed containers without any OS dependency. It...
drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes...
Recently, a malware by the name of ACbackdoor has been discovered which infects both Windows and Linux based systems. With little to...