Backdoor

Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad

Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats…

6 months ago

Millions of PC Motherboard Were Sold With Backdoor Installed

Gigabyte systems have been identified by the Eclypsium platform for exhibiting suspicious backdoor-like behavior. This discovery marks a recent development…

2 years ago

Attackers Use Malicious IIS Extensions to Deploy Covert Backdoors into Exchange Servers

As opposed to web shells, malicious extensions for the IIS web server have a lower detection rate, which means attackers…

3 years ago

A Backdoor Found in U.S. Federal Government Networks

The U.S. federal government commission has recently detected a new backdoor on Thursday; the backdoor implemented total visibility and complete…

3 years ago

New FoggyWeb Malware Attack & Install a Backdoor On Active Directory FS Servers

Researchers from Microsoft uncovered a new malware from NOBELIUM ATP threat group named FoggyWeb that gains a persistence backdoor on…

3 years ago

JSRAT – Secret Command & Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the…

3 years ago

Certificate Authority Hacked by Implanting Backdoor on Official Website

One of the largest certification authorities in Mongolia, the MonPass server has been hacked by the threat actors.  The security…

4 years ago

How iPhone Provides a Backdoor Into Your Business Data

One of the biggest benefits cited by iPhone users for their choice of device is that it has better security…

4 years ago

Hackers Use Fake Zoom Installers to Install Backdoor and Devil Shadow Botnet on Windows Computers

Hackers taking advantage of the video conferencing apps like Zoom to infect systems with malicious routines. Security researchers from Trend…

5 years ago

Operation Wocao – China’s Hidden Hackers Group Using Custom Hacking Tools to Attack More Than 10 High Profile Countries

Operation Wocao - New hidden Chinese threat groups are known as APT20 targeting various private, and government networks using custom…

5 years ago