Backdoor

Hackers Distributing PowerShell-based Backdoor Via MS Office document That Shares Stolen Data Via C&C SeverHackers Distributing PowerShell-based Backdoor Via MS Office document That Shares Stolen Data Via C&C Sever

Hackers Distributing PowerShell-based Backdoor Via MS Office document That Shares Stolen Data Via C&C Sever

Researchers observed a new Powershell based backdoor via Microsoft office document that infects similar to MuddyWater threat actor hacking tools…

6 years ago
Lazarus Hackers Group Attack Financial Organizations using a Powerful BackdoorLazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor

Lazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor

Widely active cyber criminal group Lazarus targeting financial organizations across Latin America by installing a backdoor into the targeting systems.…

6 years ago

Widely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

A cryptocurrency app, CoinTicker which is widely used in cryptocurrency industry pushing 2 different backdoors on Mac users to steal the…

7 years ago
New Android Malware Turns Your Mobile Devices into Hidden ProxiesNew Android Malware Turns Your Mobile Devices into Hidden Proxies

New Android Malware Turns Your Mobile Devices into Hidden Proxies

Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious…

7 years ago
DarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor & Provide Remote ControlDarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor & Provide Remote Control

DarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor & Provide Remote Control

Shadow Brokers Hacking Group's new administrative module Tool called DarkPulsar Leaks with persistance backdoor to provide remote control to the…

7 years ago
Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeusLazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

A cyber espionage APT group called Lazarus hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated…

7 years ago
Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office VulnerabilitiesHackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities

Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities

Newly discovered malware campaign distributing powerful FELIXROOT Backdoor using Microsoft Office Vulnerabilities to compromise the victim's windows computers. FELIXROOT backdoor…

7 years ago
Iron Cybercrime Group Distributing New Powerful Backdoor with Strong Evasion TechniquesIron Cybercrime Group Distributing New Powerful Backdoor with Strong Evasion Techniques

Iron Cybercrime Group Distributing New Powerful Backdoor with Strong Evasion Techniques

Newly discovered powerful & previously unknown backdoor using HackingTeam’s leaked Remote Control System (RCS) code to infect the thousands of…

7 years ago
Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PCMalicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PC

Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PC

A malicious Chrome and Edge Browser Extension delivers powerful backdoor to stealing information from the browsers and monitor the victim's activities.…

7 years ago
Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target SystemTurla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on…

7 years ago