backdoor

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacksChina-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia. ESET researchers revealed that a…

2 weeks ago
RansomHub affiliate uses custom backdoor Betruger<gwmw style="display:none;"></gwmw>RansomHub affiliate uses custom backdoor Betruger<gwmw style="display:none;"></gwmw>

RansomHub affiliate uses custom backdoor Betruger<gwmw style="display:none;"></gwmw>

Symantec researchers linked a custom backdoor, called Betruger, found in recent ransomware attacks to an affiliate of the RansomHub operation.…

2 months ago
China-linked APT UNC3886 targets EoL Juniper routersChina-linked APT UNC3886 targets EoL Juniper routers

China-linked APT UNC3886 targets EoL Juniper routers

Mandiant researchers warn that China-linked actors are deploying custom backdoors on Juniper Networks Junos OS MX routers. In mid-2024, Mandiant identified…

3 months ago
New Golang-based backdoor relies on Telegram for C2 communicationNew Golang-based backdoor relies on Telegram for C2 communication

New Golang-based backdoor relies on Telegram for C2 communication

Netskope Threat Labs researchers discovered a Golang-based backdoor using Telegram for C2 communication, possibly of Russian origin. Netskope Threat Labs…

3 months ago
UK Gov demands backdoor to access Apple iCloud backups worldwide<gwmw style="display:none;"></gwmw>UK Gov demands backdoor to access Apple iCloud backups worldwide<gwmw style="display:none;"></gwmw>

UK Gov demands backdoor to access Apple iCloud backups worldwide<gwmw style="display:none;"></gwmw>

UK secretly demands Apple create an iCloud backdoor via a Technical Capability Notice, raising privacy concerns over end-to-end encryption. The…

4 months ago
Threat actors exploit Aviatrix Controller flaw to deploy backdoors and cryptocurrency minersThreat actors exploit Aviatrix Controller flaw to deploy backdoors and cryptocurrency miners

Threat actors exploit Aviatrix Controller flaw to deploy backdoors and cryptocurrency miners

A critical vulnerability in Aviatrix Controller is actively exploited to deploy backdoors and cryptocurrency miners in the wild. A security…

5 months ago
PLAYFULGHOST backdoor supports multiple information stealing featuresPLAYFULGHOST backdoor supports multiple information stealing features

PLAYFULGHOST backdoor supports multiple information stealing features

PLAYFULGHOST is a new malware family with capabilities including keylogging, screen and audio capture, remote shell access, and file transfer/execution.…

5 months ago
A backdoor in millions of Shanghai Fudan Microelectronics RFID cards allows cloningA backdoor in millions of Shanghai Fudan Microelectronics RFID cards allows cloning

A backdoor in millions of Shanghai Fudan Microelectronics RFID cards allows cloning

A flaw in millions of RFID cards manufactured by Shanghai Fudan Microelectronics allows these contactless cards to be cloned instantly.…

9 months ago
Previously unseen Msupedge backdoor targeted a university in TaiwanPreviously unseen Msupedge backdoor targeted a university in Taiwan

Previously unseen Msupedge backdoor targeted a university in Taiwan

Experts spotted a previously undetected backdoor, dubbed Msupedge, that was employed in an attack against a university in Taiwan.  Broadcom…

9 months ago
North Korea-linked Kimsuky used a new Linux backdoor in recent attacksNorth Korea-linked Kimsuky used a new Linux backdoor in recent attacks

North Korea-linked Kimsuky used a new Linux backdoor in recent attacks

Symantec warns of a new Linux backdoor used by the North Korea-linked Kimsuky APT in a recent campaign against organizations…

1 year ago