backdoor

Pierluigi Paganini December 23, 2015
Hackers in the wild attempt to exploit the Juniper Backdoor

A honeypot set up by researchers at the SANS institute has shown that hackers  have already attempted to exploit the Juniper backdoor. Shortly after Juniper posted the advisory related to the presence of unauthorized code in the OS of some of its Firewalls, HD Moore, the developer of the Rapid7′ Metasploit Framework, revealed that approximately 26,000 […]

Pierluigi Paganini December 22, 2015
Who planted the Juniper ScreenOS Authentication Backdoor?

Who planted the Authentication Backdoor in the Juniper ScreenOS? Security experts are making their speculation, but interesting revelations are coming out. While the FBI is investigating the case searching for responsible for the introduction of a backdoor in a number of Juniper network devices, a number of speculation are circulating on the Internet.  Juniper Networks is a […]

Pierluigi Paganini December 13, 2015
LATENTBOT, one the highly obfuscated backdoor in the wild

Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. Experts at FireEye have discovered a stealthy botnet relying on a backdoor called LATENTBOT has compromised companies around. According to FireEye the LATENTBOT remained undetected since 2013 infecting computers in US, UK, South Korea, Brazil, United Arab Emirates, Singapore, Canada, […]

Pierluigi Paganini December 11, 2015
A well-funded cyber criminal group targets Asian organizations

Trend Micro announced that the Asian market are being targeted more than ever by well-funded cyber criminal group that appears very organized. The attacks rely on the Bifrose code to develop their backdoor, a malware that has been around since 2008. In 2014 it was reported that a new version of Bifrose appeared in the wild. Among the improvements observed […]

Pierluigi Paganini December 03, 2015
Operation Black Atlas, PoS malware is flooding network worldwide

Trend Micro uncovered a large-scale operation dubbed Black Atlas operation, in reference to notorious BlackPOS PoS malware. It’s Christmas time also for crooks, in this period the number of credit card breaches and scams increases with alarming punctuality. In the US, we use to assist an increase of credit card breaches involving PoS malware, last victims in […]

Pierluigi Paganini November 03, 2015
More than 100 Million Android users at risk due to the Baidu Moplus SDK

A vulnerability known as Wormhole affects the Baidu Moplus SDK and potentially exposes more than 100 Million users to cyber attacks. The Moplus software development kit (SDK) distributed by the Chinese Search Engine Baidu includes a functionality that can be exploited to gain access to the user’s device. The backdoor-like feature potentially exposes more than 100 Million Android users to cyber attacks. […]

Pierluigi Paganini October 06, 2015
Attackers hack into Outlook Web App (OWA) Server for access to organization network

Researchers have discovered an advanced malware that can breach organizations by infecting their Outlook Web Application (OWA) mail server. According to the experts at the Cybereason security firm threat actors breached an unnamed organization network and maintained persistence for months via a webmail server. The victim was a midsize public services company based in the […]

Pierluigi Paganini September 28, 2015
How to use GCAT backdoor with Gmail as a C&C server

The GCAT backdoor is a fully featured backdoor which could be controlled by using Gmail as a Command & Control server with multiple advantages for attackers. Establish a backdoor is one of the main goals for an attacker in order to gain persistence over the targeted machines. There are many hacking tools that allow easily to […]

Pierluigi Paganini September 24, 2015
XCodeGhost Attack – Is Apple’s Biggest Hack Ever linked to the US Intelligence?

Rumors on the Internet are linking the attack based in XcodeGhost to operations conducted by the CIA (Central Intelligence Agency). A few days ago principal security firm reported the first major cyber attack on the official Apple App Store, thousands of legitimate applications were infected by the XCodeGhost Malware. Apple announced it is cleaning up the […]

Pierluigi Paganini September 14, 2015
The VxWorks OS running also on the Curiosity Rover is flawed

A security expert discovered a critical flaw in the VxWorks, one of the most reliable real-time operating systems for the IoT also used by the Curiosity Rover. The Canadian security researcher Yannick Formaggio has discovered an important flaw in VxWorks which is the real-time operating system (RTOS) developed by the Wind River, an Intel’s subsidiary. VxWorks is one […]