Backdoor

Hackers Distributing PowerShell-based Backdoor Via MS Office document That Shares Stolen Data Via C&C Sever

Researchers observed a new Powershell based backdoor via Microsoft office document that infects similar to MuddyWater threat actor hacking tools…

6 years ago

Lazarus Hackers Group Attack Financial Organizations using a Powerful Backdoor

Widely active cyber criminal group Lazarus targeting financial organizations across Latin America by installing a backdoor into the targeting systems.…

6 years ago

Widely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

A cryptocurrency app, CoinTicker which is widely used in cryptocurrency industry pushing 2 different backdoors on Mac users to steal the…

6 years ago

New Android Malware Turns Your Mobile Devices into Hidden Proxies

Cyber criminals distributing new Android malware via Phishing email campaign that turns infected smartphones into hidden mobile proxies. This malicious…

6 years ago

DarkPulsar – A Shadow Brokers Group’s New Hacking Tool Leak To Open Backdoor & Provide Remote Control

Shadow Brokers Hacking Group's new administrative module Tool called DarkPulsar Leaks with persistance backdoor to provide remote control to the…

6 years ago

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

A cyber espionage APT group called Lazarus hits the cryptocurrency exchanges using fake installer and macOS malware using variously sophisticated…

6 years ago

Hackers Distributing FELIXROOT Backdoor Malware using Microsoft Office Vulnerabilities

Newly discovered malware campaign distributing powerful FELIXROOT Backdoor using Microsoft Office Vulnerabilities to compromise the victim's windows computers. FELIXROOT backdoor…

7 years ago

Iron Cybercrime Group Distributing New Powerful Backdoor with Strong Evasion Techniques

Newly discovered powerful & previously unknown backdoor using HackingTeam’s leaked Remote Control System (RCS) code to infect the thousands of…

7 years ago

Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PC

A malicious Chrome and Edge Browser Extension delivers powerful backdoor to stealing information from the browsers and monitor the victim's activities.…

7 years ago

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on…

7 years ago