Browsing tag

backdoor

Lenovo removes backdoor present in networking switches since 2004

Engineers at Chinese firm Lenovo have identified a backdoor in the networking switched namely Rackswitch and BladeCenter firmware. The company stated that the backdoor, referred to in the company’s security advisory (CVE-2017-3765) as “HP backdoor,” was discovered after carrying out an internal security audit of firmware for all the products featuring in its portfolio after […]

Malware infected fake Telegram Messenger app found in Play Store

The Google Play Store is home to more than 3.5 million apps but at the same time, there are tons of apps that are malicious and infected with adware or some kind of malware targeting users who download them believing that Google is handling their security the same way it does with other platforms. But the […]

Hardcoded Backdoor Found In WD My Cloud NAS With Username “MyDlink”

In yet another revelation of severe loopholes, a security researcher James Bercegay from Gulftech has discovered a backdoor in some models of the My Cloud NAS (Network-attached storage) drive family, manufactured by Western Digital. According to the blog post, the vulnerabilities, which include a hardcoded backdoor, can be used to access files even on a […]

Software used in FBI’s biometric database contains Russian code: Report

The allegations that Russia hacked the 2016 elections in the United States are known to many but now biometric data of millions of American citizens may or may not be at risk of being compromised as software used by the Federal Bureau of Investigation (FBI), the Transportation Security Administration (TSA) and 18,000 other American law enforcement agencies to […]

WordPress Captcha Plugin Contains Backdoor- 300,000 Websites at Risk

A warning has been issued by researchers disclosing the identification of a backdoor in yet another WordPress plugin called Captcha. This plugin already has nearly 300,000 installations, which shows how popular it is among the users. However, when WordFence identified that a backdoor was added to it after an update was released on December 4. […]

Another preinstalled app found on OnePlus that could collect user data

A couple of days ago it was reported that an IT security researcher Robert Baptiste who goes by the handle of Elliot Alderson on Twitter had discovered a pre-installed backdoor application called “EngineerMode” on OnePlus smartphones including its 5, 3, 3T models and OxygenOS for OnePlus 1. Now, the same researcher has found another preinstalled app in OnePlus devices sold to customers around the […]

There is a Pre-Installed Backdoor in OnePlus 5, 3 and 3T Devices

If you are using OnePlus 5, 3 or its 3T model, an IT security researcher Elliot Alderson (whose real name is Robert Baptiste) has bad news for you. The researcher has discovered that all three of its top models are being sold with a pre-installed application that can be exploited to grant a backdoor root access to an attacker. […]

OnePlus includes Qualcomm engineering app in phones, exposes root backdoor

OnePlus says it’s “looking into” the report. A Twitter user by the name “Elliot Alderson”‏ has discovered a root backdoor in OnePlus devices—one that has apparently been shipping for years. OnePlus has been shipping a Qualcomm engineering APK (an Android app file) in its devices, which with a few commands, can root a device. The […]

OnePlus Left A Backdoor That Allows Root Access Without Unlocking Bootloader

Just over a month after OnePlus was caught collecting personally identifiable information on its users, the Chinese smartphone company has been found leaving a backdoor on almost all OnePlus handsets. A Twitter user, who goes by the name “Elliot Anderson” (named after Mr. Robot’s main character), discovered a backdoor (an exploit) in all OnePlus devices […]

Intel’ Management Engine Tech Just Got Exposed Through USB Ports

Back in September 2017, Positive Technologies’ experts had expressed interest in the development of a technique that can attack the yet secretive Intel’s Management Engine (IME) technology from the USB port. Now, they have revealed additional information about their plans. According to experts, in December 2017 they intend to demonstrate that they indeed have identified […]

Hack the hackers. Watcha out the NEW IPCAM EXPLOIT, it is a scam!

Security experts have discovered a new hacking tool dubbed NEW IPCAM EXPLOIT containing a backdoor that is offered on several underground hacking forums. Wannabe hackers, be careful out of free hacking tools, many of them are scams. Recently security experts reported several cases of fake hacking tools hiding backdoors, for example, a fake Facebook hacking tool or the Cobian RAT. […]

VerticalScope hacked again; 2.7 million user accounts affected

In June 2016 we reported that the well-known Toronto, Canada-based Internet Media firm VerticalScope became a victim of a huge data breach, but the firm chose to keep this information secret from users instead of asking them to change their passwords. The breach was identified by now closed Leaked Source platform, and that’s how the […]

Ships Are Vulnerable to Cyber Attacks Due To Maritime Platform Flaw

Previously it was reported that hackers can take over ships by exploiting critical vulnerabilities in VSAT communication system. Now, security consulting firm IOActive’s researchers have discovered that there are several vulnerabilities present in the platforms used by seaborne ships to access the internet. The bugs in the software can leak data from the sea and […]

How To Create Backdoor In Kali Linux

What is backdoor? A backdoor is a method, often secret, to bypass normal authentication or encryption in an integrated computer system, product, or device (for example, a home router) or its implementation, e.g. as part of a cryptographic system, an algorithm, a chipset or a “computer homunculus” (such as Intel’s AMT technology). Backdoors are often […]

Reptile – LKM Linux Rootkit

Reptile is a LKM rootkit for evil purposes. If you are searching stuff only for study purposes, see the demonstration codes. Features Give root to unprivileged users Hide files and directories Hide files contents Hide processes Hide himself Boot persistence Heaven’s door – A ICMP/UDP port-knocking backdoor Client to knock on heaven’s door ? Install […]

3 vulnerable WordPress plugins affecting 21,000 websites

21,000 Websites Affected after Exploiting of Three WordPress Plugins Zero-day – Solution: Update Those Plugins ASAP. Zero-day vulnerabilities are blessing for cybercriminals the most and this time around hackers have managed to exploit not one or two but three of them. Security firm Wordfence reported that the three exploited vulnerabilities have affected WordPress plugins but […]

Hikvision Security Cams Compromised to Display “HACKED”

If you own Hikvision security cameras you would have noticed the sudden change in the live feed display where the normal footages were replaced with the term HACKED. However, it isn’t the case with all Hikvision security cameras but only some of them but if you are the owner of one such camera then it […]

CCleaner Malware: Here is the Full List of Affected Companies

Last week news came out that CCleaner software was infected with a backdoor. An initial investigation showed it was a state-sponsored attack. Now, Avast has finally revealed the complete list of organizations affected by the second stage CCleaner malware in its newest update published last Friday. The company has been busy in investigating the issue of […]

CCleaner Backdoor Attack: A State-sponsored Espionage Campaign

Infected CCleaner Software Attack that Affected 700,000 Customers is part of a Wide-scale State-sponsored Cyber-espionage Campaign. Previously we informed you about hacking of anti-virus maker firm Avast’s CCleaner software and embedding of a malicious malware payload in two of the software’s versions namely CCleaner v5.33.6162 and CCleaner Cloud v1.07.3191 (both are 32-bit versions). An initial […]

WhatsApp refused to add a backdoor for the UK government

The UK government has made no secret of its dislike of encrypted messaging tools, and it has made frequent reference to the problems WhatsApp causes it with regard to investigations into terrorism. Calls have been made by the government to force companies to allow access to encrypted content when asked. In the wake of Theresa May’s “more […]