Browsing tag

backdoor

Asus laptops users: Don’t update your software as new update has a backdoor

According to the authors of the book ‘Learn ethical hacking’, a group of hackers has infected hundreds of thousands of Asus computers using the company’s own update tool. According to specialists from the International Institute of Cyber Security, Asus, a company based in Taiwan, is one of the leading companies supplying portable computer equipment worldwide.  […]

Malicious Payload Evasion Techniques with Advanced Exploitation Frameworks

Sophisticated threats are Evolving with much more advanced capabilities and giving more pain for analysis even evade the advanced security software such as Antivirus. This comparison is made by the payload ability to bypass the default security frameworks accessible on Windows machines and antivirus systems available, searching for an approach to get a payload that […]

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside in the Middle East via decoy Word document to compromise and control the device. The 19-year-old vulnerability was disclosed by checkpoint security researchers last week, the vulnerability resides in the WinRAR UNACEV2.DLL library. Since the vulnerability has […]

Chinese hackers install backdoors in three videogame companies

Three companies in the videogame industry established in Asian countries have been affected by this attack campaign According to experts in network security and ethical hacking from the International Institute of Cyber Security, a recognized group of Chinese hackers known as Winnti Group compromised the systems of one platform and two videogame development companies established in Asia, […]

New backdoor malware hits Slack and Github platforms

The cybersecurity researchers at Trend Micro have discovered A new malware strain tapped into GitHub posts and Slack channels. Dubbed Slub by researchers; the malware works by exploiting a VBScript engine vulnerability that is classified as CVE-2018-8174 (patched by Microsoft last year). By doing so, the malware can compromise authentic, genuine websites and redirect the visitors to a fake page. When […]

Hackers Launching FlawedAmmyy Malware Via Undetected MS Excel Macros that Carried Powerful Backdoor

Threat actors from TA505 currently spreading powerful FlawedAmmyy RAT via weaponized MS Excel documents with malicious Excel 4.0 macro which is hard to detect by standard security controls. Observed FlawedAmmyy RAT sample is highly sophisticated that can control the infected victims remotely and evade the security software. TA505 threat actors are a well-known cybercrime group […]

Be careful: Your dedicated server in the cloud could have a malware installed by previous owners

Hackers implant backdoors on ‘Infrastructure as a Service’ hardware servers Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of a new vulnerability that allows hackers to leave backdoors in the firmware of physical servers that are reassigned to other users of cloud services, leaving new users vulnerable […]

A new dangerous Linux backdoor could trigger severe attacks

Many researchers believe that this new Trojan could detonate an important wave of cyberattacks Network security and ethical hacking researchers from the International Institute of Cyber Security reported the emergence of a cryptocurrency mining campaign that uses the Linux backdoor SpeakUp. According to reports, this campaign would have already infected more than 70k servers worldwide […]

Hack Windows, Android, Mac using TheFatRat (Step by Step tutorial)

Using Metasploit is not an difficult thing anymore. Because there are many resources that are available over the internet. Which tells usage of metasploit. Metasploit are the common ways of attacking any outdated operating system. Still there are many operating system which can be exploit remotely. And there are many anti-viruses which cannot detect these […]

Sharpshooter: Cyberattack campaign against critical infrastructure in U.S. and Latin America

Experts have discovered a cyberattack campaign against dozens of organizations dedicated to the defense and other critical tasks Digital forensics specialists from the International Institute of Cyber Security reported the emergence of a hacking campaign targeting critical infrastructure companies around the world. The hackers behind this campaign, known as Operation Sharpshooter, are deploying malware associated […]

ACLU asks court to unseal docs on US government demands to Facebook

The non-governmental agency seeks to stop US government pressure on technology and communications companies Digital forensics experts from the International Institute of Cyber Security report that the American Civil Liberties Union (ACLU) has filed a legal procedure to disclose judicial documents about the American government’s attempt to force Facebook to create an encryption backdoor on […]

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener

  Androspy is Backdoor Crypter & Creator with Automatic IP Poisener Coded By Belahsan Ouerghi Dependencies keytool jarsigner Apache2 Metasploit-Framework xterm Installation sudo apt-get install git git clone https://github.com/TunisianEagles/Androspy.git cd Androspy chmod +x setup.sh sudo ./setup.sh chmod +x androspy.sh sudo ./androspy.sh Tested on : BackBox Linux Kali linux Parrot os Contact Contact – Tunisian Eagles […]

WordPress GDPR Compliance plugin hacked to spread backdoor

Update your GDPR Compliance plugin right now. Security researchers have identified a critical vulnerability in the popular WP GDPR Compliance plugin assisting over 100,000 website owners around the world to comply with European privacy regulations known as GDPR that was announced by European Union on May 25th, 2018. The vulnerability was discovered by researchers at Wordfence which allows hackers to […]

KillShot – Information Gathering Tool

A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner Why KillShot ? You Can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner && WebApp Vul Scanner Also […]

Widely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

A cryptocurrency app, CoinTicker which is widely used in cryptocurrency industry pushing 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities. CoinTicker app actually appears as a legitimate application that helps to peoples who is willing to enter into cryptocurrency industries and make an investment. This is working in a […]

New Android Malware Turns Your Mobile Devices into Hidden Proxies

Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious app installing a fake voice-message app and turns it as a network proxies without users knowledge. This Malware named as TimpDoor that act as a backdoor with stealthy access to the home and corporate network […]

DarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor & Provide Remote Control

Shadow Brokers Hacking Group’s new administrative module Tool called DarkPulsar Leaks with persistance backdoor to provide remote control to the attackers. There are two sophisticated Frameworks called DanderSpritz and FuzzBunch published in 2017 by the same Shadow Brokers. Frameworks framework modules contain various persistance and advanced functionalities with a variety of plugins that designed to analyze […]

Experts ask Google for clarifications about backdoor in Titan Security Key

The company has been asked for information about its security software produced in China According to ethical hacking specialists from the International Institute of Cyber Security, in past days Google began to sell in Google Store the Titan Security Key, a physical token that offer two-factor authentication more robust than that provided by a SMS code or a […]

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

A cyber espionage APT group called Lazarus hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated techniques. Lazarus group widely known for cyber attacks against various financial institutions and they have successfully compromised several banks and other financial sectors. In this case attackers targeting various platform and developing malware based on […]

Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities

Newly discovered malware campaign distributing powerful FELIXROOT Backdoor using Microsoft Office Vulnerabilities to compromise the victim’s windows computers. FELIXROOT backdoor campaign initially discovered in September 2017 that distributed via malicious Ukrainian bank documents with macro that download the backdoor from C&C server. Currently attackers distributing weaponized lure documents that contains exploits for Microsoft office vulnerabilities CVE-2017-0199 and CVE-2017-11882 […]