backdoors

  1. Tomcat

    Trojans and backdoors in push-button mobile phones

    TL;DR: a considerable number of simple push-button phones present in Russian stores contain unwanted undocumented functions. They can automatically send SMS messages or go online to transmit the fact of purchase and use of the phone (transmitting the IMEI of the phone and IMSI of SIM cards)...
  2. Father

    Australian intelligence agencies subtly hint to the tech sector about the need to introduce hidden backdoors

    "Assistance to police investigations must be provided at all costs." The heads of Australia's leading law enforcement and intelligence agencies have issued a call to the top social media companies for more assistance in investigating cases involving terrorism, child exploitation and racist...
  3. Teacher

    Backdoors are already in safes: Corporate secrets on the verge of public disclosure

    How to crack any lock in seconds? S&G and SECURAM know the answer. According to a recent article in 404 Media, US Senator Ron Wyden accused two of the largest manufacturers of locks for commercial safes of creating backdoor codes in some of their products, which could potentially become a...
  4. Teacher

    Magnet Goblin: Public Servers Targeted by New Backdoors

    The group's strategy from publishing a PoC to installing malware has been identified. The Magnet Goblin group actively exploits vulnerabilities in public servers to deploy malware on Windows and Linux systems. The group is targeting 1-day vulnerabilities-publicized security issues that have...
  5. Teacher

    Iranian backdoors lurk in the defense sector of the Middle East

    The malware actively uses the Microsoft Azure infrastructure. According to the latest data from analysts at Mandiant, the Middle East has become the target of an ongoing cyber espionage operation, which uses unique malware targeting the aerospace, aviation and defense industries. According to...
  6. Brother

    0day at Ivanti allowed China to deploy backdoors in company networks

    A vulnerability in VPN devices allowed deploying 5 malicious programs at once. At least 5 different malicious programs were allegedly used by government hackers to gain access to company networks through Zero-Day vulnerabilities in Ivanti Connect Secure (ICS) VPN devices. The attacks took place...
  7. CarderPlanet

    Chinese state hackers detected in Cisco router firmware

    Who is behind the new wave of cyber attacks? US and Japanese cybersecurity authorities and law enforcement agencies are warning about the actions of the Chinese hacker group BlackTech. This group disrupts network devices by installing specialized backdoors to access corporate networks. A joint...
  8. CarderPlanet

    Xitan Laboratory report with analytics on five backdoors

    Following Qihoo 360, researchers at the Chinese Xitan Laboratory continue a single echelon of large-scale pendosliv, shattering the paradigm of the Western infosec, where evil totalitarian hackers are necessarily attributed only to Russia, China, Iran and North Korea. A new wave of criticism...
  9. Carding

    Remote hacking: Researchers found a backdoor in 1952 Citrix NetScaler devices

    NCC Group warns that even patches may not save you. Cybersecurity company NCC Group said in a report that nearly 2,000 Citrix NetScaler instances were compromised. Attackers exploited the recently discovered critical vulnerability CVE-2023-3519. Presumably, it was useful for installing web...
  10. Tomcat

    Criminals Hack VPN Servers to Install Backdoors

    Supposedly Iranian government-sponsored cybercriminal groups exploit VPN server vulnerabilities in their malicious campaigns to create backdoors in companies around the world. According to a report by specialists from the Israeli company ClearSky, Iranian cybercriminals are attacking...
  11. Hacker

    Backdoor on any MacBook in 5 minutes

    Holivars about which operating system is most secure - macOS or Windows are an eternal topic. Most people will say that macOS is more secure, but we'll show you how to create a backdoor on your MacBook in less than two minutes, and then just support the reverse shell with the tools already built...
  12. [LIVE] How To Clean And Detect Backdoors on Scampages

    [LIVE] How To Clean And Detect Backdoors on Scampages

  13. Carding

    Backdoors

    Backdoors are called one of the varieties of malicious programs, as well as utilities of hidden access to a computer, specially created by developers of any software to perform unauthorized or undocumented actions. The term comes from the English phrase back door, which translates as "back...
Top