Browsing tag

backdoor

How to Generate a PHP Backdoor using Weevely – Kali Linux

Weevely is a web shell designed for post-exploitation purposes that can be extended over the network at runtime. Upload weevely PHP agent to a target web server to get remote shell access to it. It has more than 30 modules to assist administrative tasks, maintain access, provide situational awareness, elevate privileges, and spread into the […]

EvilOSX – Evil Remote Administration Tool (RAT) for macOS/OS X – Kali Linux 2018.2

Evil Remote Administration Tool (RAT) for macOS/OS X Features Emulate a terminal instance Simple extendable module system No bot dependencies (pure python) Undetected by anti-virus (OpenSSL AES-256 encrypted payloads) Persistent Retrieve Chrome passwords Retrieve iCloud tokens and contacts Retrieve/monitor the clipboard Retrieve browser history (Chrome and Safari) Phish for iCloud passwords via iTunes iTunes (iOS) backup enumeration Record the microphone […]

Iron Cybercrime Group Distributing New Powerful Backdoor with Strong Evasion Techniques

Newly discovered powerful & previously unknown backdoor using HackingTeam’s leaked Remote Control System (RCS) code to infect the thousands of victim around the world. This backdoor is created by Iron Cybercrime Group who is behind the recently dicovered Iron ransomware that infected various countries victims in past year. Also, Iron Cybercrime Group actively developing and […]

Malicious Chrome & Edge extension drops backdoor and spy on users

Trend Micro researchers have identified malicious Google Chrome and Microsoft Edge browser extension that is distributing backdoor to steal information from the browser as well as a spy upon the user. According to researchers, there are two payloads involved in the ‘series of testing submissions in VirusTotal’. The submission sources and filenames hint upon the […]

Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PC

A malicious Chrome and Edge Browser Extension delivers powerful backdoor to stealing information from the browsers and monitor the victim’s activities. A downloader that delivers the malware payload that contains  Revisit remote administration tool along with a backdoor extension to hijack the infected system. The two payloads are apparently distributing from a group of Malware authors called […]

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on the target system. Turla hacking group actively targetting various countries, several governments, and organization since 2008 including they breached the US Department of Defense and defense industry. Attackers are always changing the tactics and evading technique to maintain its […]

Researchers Found Backdoor in Python Library That Steal SSH Credentials

Recently we saw an attempt to hide a back door in a code library, and today there is a new case. This time, information security experts found the backdoor in a Python module. In the SSH Decorator module (ssh-decorate), created by the Israeli developer Uri Goren, which is a library for handling SSH connections from the Python […]

New macOS malware aims at infecting devices with malicious macros

The general perception about Apple devices is that they are protected from malware attacks by default which is not true at all especially after a sudden surge in attacks aiming at iPhones and macOS. To prove that the IT security researchers at Trend Micro have discovered a new malware which they believe is associated with OceanLotus also […]

Powershell-RAT backdoor that uses Gmail to exfiltrate data

Python based backdoor that uses Gmail to exfiltrate data as an e-mail attachment. This RAT will help someone during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends the information to an attacker as an e-mail attachment, information security training professional said. This piece of code is Fully […]

Fully Undetected Backdoor with RSA Encrypted Shell using TopHat – Kali Linux 2018.1

TopHat is inspired by metasploit’s capabilties of meterpreter however it was coded to generate a undetected encrypted backdoor using python. Usage: python tophat.py (local host) (local port) Video: Download WordPress Themes Free Premium WordPress Themes Download Download Nulled WordPress Themes Download Premium WordPress Themes Free download udemy paid course for free download xiomi firmware Download […]

Parat – Python Based Remote Administration Tool (RAT)

Parat is a simple remote administration tool (RAT) written in python. Also you can read wiki! Change log: Compatible with both python 2 and 3 versions(dont forget that may causes some error.so please share us any error(s)) Do you want to try? Copy and paste on your terminal:git clone https://github.com/micle-fm/Parat && cd Parat && python […]

Raw sockets backdoor gives attackers complete control of some Linux servers

“Chaos” gives attackers, and follow-on attackers, full control over infected boxes. A stealthy backdoor undetected by antimalware providers is giving unknown attackers complete control over at least 100 Linux servers that appear to be used in business production environments, warn researchers. In a blog post published Wednesday, Montreal-based GoSecure claimed that a piece of malware dubbed “Chaos” […]

New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor

A new Internet of Things (IoT) botnet campaign dubbed as DoubleDoor has been discovered by NewSky Security, which uses two exploits for bypassing authentication procedures on victim devices and also nullify additional security features. In this campaign, attackers can easily take full control of the targeted devices despite the user has enabled authentication or added […]

Flaw in Telegram Windows App Used for Cryptomining & Backdoor

Another day, another popular app compromised to drop backdoor and conduct cryptomining. Telegram Messenger’s critical zero-day flaw that according to Kaspersky Labs researchers was widely being exploited by cybercriminals since March 2017 to distribute a relatively newer kind of malware on computers has now been fixed by the messenger developers. The vulnerability was equipped with numerous […]

Attackers can Bypass Fingerprint Authentication in Lenovo devices

Vulnerability in Lenovo Devices Allows Attacker to Bypass Fingerprint Authentication and Gain Higher Privileges. In case you own a ThinkCentre, ThinkPad or ThinkStation system manufactured by Lenovo, then we suggest that you immediately install an important security fix so as to prevent the vulnerability that bypasses encoded fingerprint data with a hardcoded password. More: Lenovo removes […]

Pirated Version of Fire and Fury Book Loaded with Malware

Another day, another malware scam – This time, the pirated version of Fire and Fury book has been found infecting devices with a backdoor. An IT security researcher at Kaspersky Labs, Michael Molsner, has pointed out in his latest research that hackers are trying to benefit from the hype that the new book from Michael […]