Backdoor

We talk about all the newest stories and details about backdoor holes in software and systems in this section. Reports on new backdoor risks, security holes, attacker techniques, and ways to find and stop them are all included. To improve cybersecurity and keep sensitive data safe, learn about the risks and possible answers for backdoors.

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform, as researchers discovered malicious domains mimicking…

4 days ago

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can't be…

2 months ago

Hackers Using Supershell Malware To Attack Linux SSH Servers

Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell…

2 months ago

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails…

2 months ago

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…

2 months ago

Backdoor MIFARE Smart Cards Exposes User-Defined Keys On Cards

Researchers analyze the security of MIFARE Classic cards, focusing exclusively on card-only attacks. They uncover multiple new attack vectors by…

3 months ago

Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad

Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats…

4 months ago

Millions of PC Motherboard Were Sold With Backdoor Installed

Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This discovery marks a recent development…

1 year ago

Attackers Use Malicious IIS Extensions to Deploy Covert Backdoors into Exchange Servers

As opposed to web shells, malicious extensions for the IIS web server have a lower detection rate, which means attackers…

2 years ago

A Backdoor Found in U.S. Federal Government Networks

The U.S. federal government commission has recently detected a new backdoor on Thursday; the backdoor implemented total visibility and complete…

3 years ago