Browsing tag

backdoors

Five Eyes Group demands access to crime suspects data through encryption backdoors

The group threatens to take legal action Five Eyes alliance member countries have threatened to implement legislation if technology providers do not cooperate with authorities to break end-to-end encryption in specific cases where private information about suspects is sought of criminal activity, as reported by ethical hacking experts from the International Institute of Cyber Security. The five country […]

Government Source Code Reviews will not be permitted by McAfee Anymore

News reported in June that McAfee was amongst several Western technology organizations that had acceded in recent years to larger demands by Moscow for access to source code, the directions that control basic operations of computer equipment. The reviews, carried in secure facilities known as “clean rooms” by Russian organizations with expertise in technology testing, […]

ZeroDoor – A Script Written Lazily For Generating Cross-Platform Backdoors – Kali Linux 2017.2

Hey Guys, In this video i show you a cool script called ZeroDoor which used for Generating Cross-Platform Backdoors. ZeroDoor:https://github.com/Souhardya/Zerodoor A script written lazily for generating reverse shell backdoors on the go whenever you need without any hassle for your daily penetration needs . These backdoors are not James Bond high tech stuff but rather […]

ZeroDoor – A Script Written Lazily For Generating Cross-Platform Backdoors

A script written lazily for generating reverse shell backdoors on the go whenever you need without any hassle for your daily penetration needs . These backdoors are not James Bond high tech stuff but rather simple ones to prevent over exploitation and limited capabilities Once you generate the payload somehow execute on the concerned system […]

Generate Shellcodes & Backdoors using ShellSploit Framework and Kali Linux 2017.2

Hey Guys, In this video i show you how to generate shellcodes and Backdoors using ShellSploit Framework and Kali Linux 2017.2. ShellSploit: https://github.com/vasco2016/shellsploit-framework Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. Dependences root$ sudo pip install capstone root$ sudo pip install readline(Not necessary […]

SambaCry Vulnerability Used to Deploy Backdoors on NAS Devices

Someone is using the SambaCry vulnerability to install a backdoor trojan on Linux devices running older versions of the Samba file-sharing server. According to experts from Trend Micro, most of the attacks have targeted network-attached storage (NAS) appliances, some of which ship with the Samba server to provide file-sharing interoperability between different operating systems. SHELLBIND […]

Open Ports Create Backdoors in Millions of Smartphones

Mobile applications that open ports on Android smartphones are opening those phones to remote hacking, claims a team of researchers from the University of Michigan. Open ports are a well-known threat vector on servers, where administrators deploy security software with the primary purpose of shutting down or alerting the owner every time an unauthorized port […]

Expect renewed push for encryption backdoors from Trump administration

Top law enforcement officers, FBI director James Comey and Trump’s nominee for attorney general, Sen. Jeff Sessions, are supportive of giving law enforcement means to sidestep encryption. It seems likely that the Trump administration will push for policies forcing tech companies to create cryptographic backdoors in the name of helping law enforcement, a highly controversial […]

Dutch coder built backdoors into thousands of websites

Dutch developer used built-in backdoors in websites to steal personal information of customers. A 35-year-old unnamed web developer from Leeuwarden, Netherlands has used personal information stolen from customers to open gambling accounts, convince friends and relatives to transfer money, and make online purchases on his behalf, according to The Register. Some of the identity abuses […]

FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE

Trojan targets desktops, not servers or IoT devices. Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks. Russian antivirus vendor Dr.Web discovered this new trojan in October. The company’s malware analysts say the trojan is spread in the form of […]

A Malicious ‘Pokémon GO’ App Is Installing Backdoors on Android Devices

Nintendo’s new location-based augmented reality game ‘Pokémon GO’ is hot right now. Like really, really popular—so much so that players are spoofing their phone’s location using VPNs in their quest to catch ’em all. But wannabe Pokémon masters should take heed: amid high demand for the game as it slowly rolls out across the globe, […]

Exploring and exploiting Lenovo firmware secrets

Hi, everyone! In this article I will continue to publish my research of Lenovo ThinkPad’s firmware. Previously I shownhow to discover and exploit SMM callout vulnerabilities on example of SystemSmmAhciAspiLegacyRt UEFI driver1day vulnerability. Also, I introduced a small toolkit called fwexpl that provides API for comfortable development of firmware exploits for Windows platform. My previous […]

Shellsploit – New Generation Exploit Development Kit

Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system and let’s you obfuscate every byte via encoders. Install/Uninstall If you want to use Shellsploit, you have to install Capstone first. For the Capstone’s installation: root$ sudo pip install capstone Also pyreadline for tab completion: root$ sudo pip install readline (Not necessary for […]

How to Build Stealth Backdoors

Today I’m going to tell you about a couple of techniques used to build stealth backdoors. Then, I will also show you how to detect that kind of malware and keep your systems safe. But first, a brief introduction. I started looking into this after reading a quite sensationalist article about a Linux backdoor. The […]

British Government Has Already Created a Data Encryption Protocol Complete With a Backdoor

GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG. Britain’s intelligence agency, GCHQ (Government Communications Headquarters), has already developed a phone encryption protocol that contains a backdoor, as the government has been recently asking companies to provide. During the past year, both the US and UK governments […]

New York tries to force phone makers to put in crypto backdoors

The sport of holding Apple, Google and other tech companies over a barrel to demand backdoors now has a new player: New York. The state assembly has come up with a proposed bill that would ban encrypted mobile phones and slap manufacturers with a $2,500 fine per phone sold in the state of New York […]

What the government should’ve learned about backdoors from the Clipper Chip

The Obama administration’s calls for backdoors echo the Clinton-era key escrow fiasco. In the face of a Federal Bureau of Investigation proposal requesting backdoors into encrypted communications, a noted encryption expert urged Congress not to adopt the requirements due to technical faults in the plan. The shortcomings in question would allow anyone to easily defeat the measure with […]

APT Group Upgrades Malware from the Black Market into Dangerous Backdoor

Cyber-espionage group targeted companies in Asia. Details about the operations of a new cyber-espionage group are emerging, and this gang has been buying malware from the black market and evolving it into powerful and undetectable backdoors. The group, dubbed Shrouded Crossbow by Trend Micro’s researchers, has been extremely active since 2010, when the first signs of […]

Relentless Sofacy APT Attacks Armed With Zero Days, New Backdoors

A new analysis of the Sofacy APT gang, a Russian-speaking group carrying out targeted attacks against military and government offices for close to a decade, shows a relentless wave of intrusions peaking this summer against victims in a number of NATO countries and the Ukraine. Researchers at Kaspersky Lab this morning released their update on […]

HDRoot Bootkit Impersonates Microsoft’s Net Command

HDRoot is the work of the Winnti APT group. Hackers activating mainly in South-East Asia have developed a new bootkit trojan, which disguises as Microsoft’s built-in Net command to avoid detection. The threat was discovered by Russian-based Kaspersky Labs security vendor, which goes on to say that the bootkit seems to be an evolution from the […]