Backdoor

We talk about all the newest stories and details about backdoor holes in software and systems in this section. Reports on new backdoor risks, security holes, attacker techniques, and ways to find and stop them are all included. To improve cybersecurity and keep sensitive data safe, learn about the risks and possible answers for backdoors.

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims DeviceLazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and far-reaching operation of the Lazarus…

2 months ago
Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom BackdoorJuniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with a backdoor attack that leverages a…

2 months ago
QSC: Multi-Plugin Malware Framework Installs Backdoor on WindowsQSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

QSC: Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path to the Core module code.…

3 months ago
Stealthy Steganography Backdoor Attacks Target Android AppsStealthy Steganography Backdoor Attacks Target Android Apps

Stealthy Steganography Backdoor Attacks Target Android Apps

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on mobile devices. Existing backdoor attacks often…

3 months ago
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & DropboxSMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox

UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often…

4 months ago
Rekoobe Backdoor In Open Directories Possibly Attacking TradingView UsersRekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

Rekoobe Backdoor In Open Directories Possibly Attacking TradingView Users

APT31, using the Rekoobe backdoor, has been observed targeting TradingView, a popular financial platform, as researchers discovered malicious domains mimicking…

4 months ago
Researchers Backdoored Azure Automation Account Packages And Runtime EnvironmentsResearchers Backdoored Azure Automation Account Packages And Runtime Environments

Researchers Backdoored Azure Automation Account Packages And Runtime Environments

Runtime environments offer a flexible way to customize Automation Account Runbooks with specific packages. While base system-generated environments can't be…

6 months ago
Hackers Using Supershell Malware To Attack Linux SSH ServersHackers Using Supershell Malware To Attack Linux SSH Servers

Hackers Using Supershell Malware To Attack Linux SSH Servers

Researchers identified an attack campaign targeting poorly secured Linux SSH servers, where the attack leverages Supershell, a cross-platform reverse shell…

6 months ago
UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF ReaderUNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970 Hackers Attacking Job Seekers Using Weaponized PDF Reader

UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails…

7 months ago
New Loki Backdoor Attacking macOS SystemsNew Loki Backdoor Attacking macOS Systems

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…

7 months ago