Azure
Researchers Backdoored Azure Automation Account Packages And Runtime Environments
Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages.While base system-generated environments can't be directly modified, they can be indirectly changed by adding...
Backdoor
Hackers Using Supershell Malware To Attack Linux SSH Servers
Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell backdoor written in Go,...
Backdoor
UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader
UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails pretending to be job...
Backdoor
New Loki Backdoor Attacking macOS Systems
Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses the limitations of existing...
Backdoor
Backdoor MIFARE Smart Cards Exposes User-Defined Keys On Cards
Researchers analyze the security of MIFARE Classic cards, focusing exclusively on card-only attacks. They uncover multiple new attack vectors by examining the CRYPTO-1 algorithm,...
Backdoor
Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad
Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats since March 2024. This...
Backdoor
Millions of PC Motherboard Were Sold With Backdoor Installed
Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This discovery marks a recent development in detecting potential security...
Backdoor
Attackers Use Malicious IIS Extensions to Deploy Covert Backdoors into Exchange Servers
As opposed to web shells, malicious extensions for the IIS web server have a lower detection rate, which means attackers are increasingly using them...
Backdoor
A Backdoor Found in U.S. Federal Government Networks
The U.S. federal government commission has recently detected a new backdoor on Thursday; the backdoor implemented total visibility and complete control over the agency...
Backdoor
New FoggyWeb Malware Attack & Install a Backdoor On Active Directory FS Servers
Researchers from Microsoft uncovered a new malware from NOBELIUM ATP threat group named FoggyWeb that gains a persistence backdoor on Active Directory Federation Services...
Backdoor
JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target...