Browsing tag

backdoor

Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data

A Remote Access Trojan (RAT) is one of the most used malicious software used by cybercriminals to target unsuspecting users. Based on its extensive use the IT security researchers at Sophos have discovered that there is a new RAT malware called Kedi that uses Gmail to steal data from the targeted computer. The malware relies upon spear phishing […]

Backdoor Found in WordPress Plugin With More Than 200,000 Installations

For the past two and a half months, a WordPress plugin named Display Widgets has been used to install a backdoor on WordPress sites across the Internet. The backdoor code was found between Display Widgets version 2.6.1 (released June 30) and version 2.6.3 (released September 2). The WordPress.org team has intervened and removed the plugin […]

A New Gazer Backdoor Is Targeting Ministries and Embassies Around The World

ESET security researchers have discovered a new gazer backdoor campaign targeted at consulates, ministries, and embassies around the world to spy on governments and diplomats. Activated since 2016, the malware campaign is taking advantage of a new gazer backdoor, called Gazer, and is believed to be conducted by the hijackers of advanced Turla hackers (APTs) […]

Three Hardcoded Backdoor Accounts Discovered in Arris Modems

Security researchers have found five gaping holes in the firmware running on Arris modems, three of which are hardcoded backdoor accounts. An attacker could use any of these three accounts to access and take over the device with elevated privileges — even root — install new firmware, and ensnare the modem in a larger botnet. […]

New ESET research uncovers Gazer, the stealthy backdoor that spies on embassies

Security researchers at ESET have released new research today into the activities of the notorious Turla cyberespionage group, and specifically a previously undocumented backdoor that has been used to spy on consulates and embassies worldwide. ESET’s research team are the first in the world to document the advanced backdoor malware, which they have named “Gazer”, despite evidence that […]

Hidden Kill Switch Identified in Controversial Intel ME controller chip

Europe’s leading cyber-security firm Positive Technologies’ security researchers have a bad news for Intel users. They have detected a secret configuration setting or kill switch that disables Intel Management Engine (ME) 11 chip. This chip comprises of a microcontroller, and its task is to control CPU, so if it gets disabled then the device will […]

Beware; dangerous new malware ‘Joao’ hits gamers worldwide

Gaming is an addiction but for cyber criminals, it is a lucrative business. IT security researchers at ESET have discovered a new malware targeting gamers around the world. Dubbed “Joao” by researchers; the malware exists in third party websites offering malicious setups for Aeria games. The malware works in such a way that once executed it can […]

MACOS FRUITFLY BACKDOOR ANALYSIS RENDERS NEW SPYING CAPABILITIES

LAS VEGAS—The FruitFly backdoor became a known entity in January, but it’s a good bet that for years it had been in the wild, undetected by analysts and security software. The macOS and OS X malware has a number of insidious spying capabilities that would make anyone uneasy, and a variant recently analyzed by Synack […]

Stantinko Modular Backdoor Infected Over 500,000 Computers

Over 500,000 users have had their computers infected with a stealthy malware named Stantinko, according to a 99-page report released yesterday by Slovak antivirus maker ESET. The malware is a modular trojan with advanced backdoor capabilities, but according to ESET, its authors have only used it hijack search results and sometimes carry out brute-force attacks on […]

Multiple Groups Have Been Exploiting ETERNALBLUE Weeks Before WannaCry

We have found evidence of much more sophisticated actors leveraging the NSA ETERNALBLUE exploit to infect, install backdoors and exfiltrate user credentials in networks around the world, including the US, three weeks prior to the WannaCry attack. These attacks might pose a much bigger risk than WannaCry. Even if companies were able to block WannaCry […]

HIKVISION PATCHES BACKDOOR IN IP CAMERAS

Hikvision, a Chinese manufacturer of video surveillance equipment, recently patched a backdoor in a slew of its cameras that could have made it possible for a remote attacker to gain full admin access to affected devices. The backdoor stems from two bugs: an improper authentication bug and a password in configuration file vulnerability. Both bugs […]

Leaked: The UK’s secret blueprint with telcos for mass spying on internet, phones – and backdoors

Real-time full-blown snooping with breakable encryption. The UK government has secretly drawn up more details of its new bulk surveillance powers – awarding itself the ability to monitor Brits’ live communications, and insert encryption backdoors by the backdoor. In its draft technical capability notices paper [PDF], all communications companies – including phone networks and ISPs […]

Milkydoor: A malware which can turn an Android phone into hacking device

Hackers have developed a highly sophisticated malware named “Milkydoor” which can turn any infected Android phone into a hacking tool. Trend Micro, a security firm, revealed on Thursday the discovery of a new malware “Milkydoor” which can be used by hackers to access the networks the phone is connected to, and steal data from it. Businesses in […]

Booby trap a shortcut with a backdoor

Embedding a shortcut (.lnk file) which points to powershell (accompanied by an encoded command) in a word document or zip file is a known sneaky trick to spread malware. The trick was alledegly also used by a Russian APT group called grizzly bear (source: Volexity, CrowdStrike), the same group who allegedly is responsible for hacking […]

British Authorities Slam WhatsApp for Encryption Used by London Terrorist

The Brits join US intelligence agencies who’d want a backdoor into the encryption feature on all services. End-to-end encryption services like WhatsApp are once more being slammed for offering protection for users everywhere. This time, the UK is doing all the finger pointing, and it’s because of the terrorist attack that took place on Wednesday. […]

Chinese PUPs distributing Backdoored Drivers which affect Windows operating system

PUP(potentially unwanted program) packages that install’s along with Chinese software’s consist of backdoors targeting English speakers. The backdoor was uncovered by Malware bytes research team by analyzing a China-developed WiFi hotspot application. Distribution of Backdoor These backdoors are being dropped by one of the major PUP bundler networks and then the bundler runs the installation hidden […]

BitErrant attack

The BitErrant attack is a fun little exploit that shows what can go wrong in the BitTorrent protocol when SHA1 collisions become reality. SHA1 collisions resulting in chunks of the downloaded file become replaceable with a chunk that is completely different, corrupting the downloaded file OR triggering backdoor functionalities. An attacker can alter the execution […]

Hidden backdoor discovered in Chinese IoT devices

Researchers at Trustwave have uncovered a backdoor in IoT devices from a Chinese manufacturer that could leave them open to exploitation. The backdoor is present in almost all devices produced by VoIP specialist DBLTek, and appears to have been purposely built in for use by the vendor. It uses a simple challenge and response mechanism […]