Browsing tag

backdoor

Cryptsy Bitcoin Trader Robbed, Blames Backdoor in the Code of a Wallet

The stolen Bitcoin & Litecoin were worth over $5.7 million. Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a security incident, accusing the developer of Lucky7Coin of stealing 13,000 Bitcoin and 300,000 Litecoin, which at today’s rate stands more than $5.7 million / €5.2 million. According to a blog post penned by […]

How Your Webcam Can Become Your Worst Nightmare

A group of security researchers turned a working webcam into a backdoor allowing attackers to remotely connect themselves with the device. The dangers of hackable Internet of Things (IoT) devices are various and wide-ranging and it is becoming more and more likely that such devices get hacked through some simple engineering skills. Recently, the Vectra Networks researchers […]

Juniper drops NSA-developed code following new backdoor revelations

Researchers contradict Juniper claim that Dual_EC_DRBG weakness couldn’t be exploited. Juniper Networks, which last month made the startling announcement its NetScreen line of firewalls contained unauthorized code that can surreptitiously decrypt traffic sent through virtual private networks, said it will remove a National Security Agency-developed function widely suspected of also containing a backdoor for eavesdropping. […]

FireEye Security Devices Provide Attackers with Backdoor into Corporate Networks

FireEye security equipment can be compromised, Google finds. Two security researchers working for Google have discovered a simple method of compromising FireEye security products, which, ironically, are installed to prevent a network’s computers from being compromised. According to Google’s findings, attackers can craft malicious files or fool users into accessing malicious links and exploit an issue […]

LATENTBOT, one the highly obfuscated backdoor in the wild

Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. According to FireEye the LATENTBOT remained undetected since 2013 infecting computers in US, UK, South Korea, Brazil, United Arab Emirates, Singapore, Canada, […]

Kazakhstan will force its citizens to install internet backdoors

The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month, Kazakhstan will begin enforcing a new law that requires every internet user in the country to install a backdoor, allowing the government to conduct surveillance. In a brief statement (translated), KazakhTelecom, the country’s […]

Hack Remote Windows PC using The Backdoor factory with Metasploit

The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First of all download the-backdoor-factory-master from here. Now unzip the-backdoor-factory-master .zip file. And save in your desktop Now move to the-backdoor-factory-master directory & install it. Now download putty.exe file and check whether this binary […]

No backdoor, no service: BlackBerry to exit Pakistan

Blackberry is all set to shut down its operations in Pakistan. The statement came from the company after continuing request from the government to install a backdoor in the enterprise devices. Blackberry earlier this year received a ban from PTA (Pakistani Telecommunications Authority) when the company refused to install backdoors in their devices. The ban […]

600,000 cable modems have an easy to pop backdoor in a backdoor

Brazilian whacks Arris for easy-t-o-guess default password, fix promised fast. Security bod Bernardo Rodrigues has found a backdoor-within-a-backdoor affecting some 600,000 Arris cable modems. The broadband kit company said, in a statement to El Reg, that it is working “around the clock” to fix the problems. Rodrigues (@bernardomr), a vulnerability tester with Brazil’s Globo television […]

Brazilian Army Gets Hacked Following Cyber-Games Cheating Accusations

Hackers leak data of over 7,000 officers. Hackers who declined to name themselves hacked the servers of the Brazilian Army, and later leaked the personal details of around 7,000 officers. The attack was carried out after the Brazilian Army’s team was accused of cheating in a series of cyber-security games. The game in question is CTF […]

Top FBI lawyer: You win, we’ve given up on encryption backdoors

We’re your servants, says general counsel unconvincingly After spending months pressuring tech companies to add backdoors into their encryption software, the FBI says it has given up on the idea. Speaking at a conference in Boston on Wednesday, the bureau’s general counsel James Baker even used the term that has been repeatedly used to undermine […]

Return of the EXIF PHP Joomla Backdoor

Our Remediation and Research teams are in constant communication and collaboration. It’s how we stay ahead of the latest threats, but it also presents an opportunity to identify interesting threats that aren’t new but may be reoccuring. Such as today’s post, in which we explore a case we shared close to two years ago where […]

Hackers Can Steal Corporate Passwords Through Cisco’s WebVPN Service Backdoor

Researchers identified a flaw in Cisco’s WebVPN — Hackers managed to install backdoors via two methods on the service — This weakness allows hackers to steal corporate account passwords when employees logged into their accounts. Hackers managed to load backdoors via different JavaScript snippets which were then loaded on Cisco’s ASA WebVPN service. The procedure […]

Abusing Windows Management Instrumentation (WMI) to Build a persistent, Asynchronous and Fileless Backdoor

Matt Graeber showed the method on performing WMI attacks and its effects, but he didn’t talk much about the details. Therefore, this paper mainly details about using powershell to implement WM attacks. 0x01 Introduction In intranet penetration, wmiexec is the most commonly seen tool that frequently uses WMI, which is previously mentioned in http://drops.wooyun.org/tips/7358. So […]

Backdoor infecting Cisco VPNs steals customers’ network passwords

Dozens of successful attacks detected that install malicious code on company portals. Attackers are infecting a widely used virtual private network product sold by Cisco Systems to install backdoors that collect user names and passwords used to log in to corporate networks, security researchers said. A researcher from security firm Volexity told Ars that he’s […]

New PoS Trojan Can Download Other Malware, Launch DDOS Attacks

The world of computer viruses and antivirus solutions is in a constant change, with cyber-crooks evolving their code and cyber-security firms trying to keep up but always being two steps behind. In recent years, malware targeting PoS (Point of Sale) stations has been constantly evolving, with new versions coming out almost each month, with businesses […]

NATO Will Check for Backdoors in Microsoft’s Products

Microsoft has taken NATO onboard in its program which presents information about vulnerabilities and provides access to source code. A Security Agreement between NATO and Microsoft has been signed, which gives NATO the authority to vet the source code of Microsoft’s products for backdoors. This deal can be regarded as an extension of the 12-year […]

Cisco Routers Vulnerable To Malware Attacks Via Backdoor Firmware Installation

It has always been believed that Cisco routers being used in the enterprise environment could be hacked via installation of backdoor firmware, but it was always just a theory. Now, security researchers over at Mandiant, an American cyber security firm and a FireEye company, have confirmed that hacking of Cisco routers through backdoor firmware installations […]

Survey Shows Most Americans are Fine with Backdoor in Their Devices

A recent survey from Vormetric revealed that people in the United States are OK with the addition of backdoors in their devices/software. This startling revelation negated the general perception that Americans greatly value their privacy. The survey was conducted by Vormetric and Wakefield regarding the ongoing debate between tech firms and the US government regarding […]