Tag: backdoor

  • Schneier on Security: Perfectl Malware

    Source URL: https://www.schneier.com/blog/archives/2024/10/perfectl-malware.html Source: Schneier on Security Title: Perfectl Malware Feedly Summary: Perfectl in an impressive piece of malware: The malware has been circulating since at least 2021. It gets installed by exploiting more than 20,000 common misconfigurations, a capability that may make millions of machines connected to the Internet potential targets, researchers from Aqua…

  • Wired: A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines

    Source URL: https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/ Source: Wired Title: A Mysterious Hacking Group Has 2 New Tools to Steal Data From Air-Gapped Machines Feedly Summary: It’s hard enough creating one air-gap-jumping tool. Researchers say the group GoldenJackal did it twice in five years. AI Summary and Description: Yes Summary: This text details the discovery of two advanced tool…

  • Hacker News: Bug, $50K+ in bounties: how Zendesk left a backdoor in companies

    Source URL: https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52 Source: Hacker News Title: Bug, $50K+ in bounties: how Zendesk left a backdoor in companies Feedly Summary: Comments AI Summary and Description: Yes Summary: The text narrates the journey of a young programmer discovering a significant security vulnerability in Zendesk, which could potentially expose sensitive customer support tickets for multiple Fortune 500…

  • The Register: US lawmakers seek answers on alleged Salt Typhoon breach of telecom giants

    Source URL: https://www.theregister.com/2024/10/11/us_lawmakers_salt_typhoon/ Source: The Register Title: US lawmakers seek answers on alleged Salt Typhoon breach of telecom giants Feedly Summary: Cyberspies abusing a backdoor? Groundbreaking Lawmakers are demanding answers about earlier news reports that China’s Salt Typhoon cyberspies breached US telecommunications companies Verizon, AT&T, and Lumen Technologies, and hacked their wiretapping systems. They also…

  • Slashdot: Chinese Hack of US ISPs Show Why Apple Is Right About Backdoors

    Source URL: https://apple.slashdot.org/story/24/10/10/025236/chinese-hack-of-us-isps-show-why-apple-is-right-about-backdoors?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Chinese Hack of US ISPs Show Why Apple Is Right About Backdoors Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant cybersecurity incident involving Chinese hackers accessing U.S. ISPs’ systems, which were compromised due to security backdoors created for law enforcement wiretaps. This situation emphasizes…

  • Hacker News: European govt air-gapped systems breached using custom malware

    Source URL: https://www.welivesecurity.com/en/eset-research/mind-air-gap-goldenjackal-gooses-government-guardrails/ Source: Hacker News Title: European govt air-gapped systems breached using custom malware Feedly Summary: Comments AI Summary and Description: Yes Summary: This text presents an extensive analysis of the GoldenJackal APT group’s cyberespionage activities, notably their attacks on air-gapped systems within governmental organizations in Europe. It introduces previously undocumented malware tools employed…

  • Wired: Stealthy Malware Has Infected Thousands of Linux Systems for Years

    Source URL: https://arstechnica.com/security/2024/10/persistent-stealthy-linux-malware-has-infected-thousands-since-2021/ Source: Wired Title: Stealthy Malware Has Infected Thousands of Linux Systems for Years Feedly Summary: Perfctl malware is hard to detect, persists after reboots, and can perform a breadth of malicious activities. AI Summary and Description: Yes Summary: The text discusses a stealthy malware strain named Perfctl that has infected thousands of…

  • Slashdot: Attackers Exploit Critical Zimbra Vulnerability Using CC’d Email Addresses

    Source URL: https://it.slashdot.org/story/24/10/02/230241/attackers-exploit-critical-zimbra-vulnerability-using-ccd-email-addresses Source: Slashdot Title: Attackers Exploit Critical Zimbra Vulnerability Using CC’d Email Addresses Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a critical vulnerability (CVE-2024-45519) in Zimbra mail servers that attackers are exploiting to execute malicious commands and install backdoors. This situation poses significant risks for medium and large organizations…

  • Hacker News: 1.3M Android-Based TV Boxes Backdoored; Researchers Still Don’t Know How

    Source URL: https://arstechnica.com/security/2024/09/researchers-still-dont-know-how-1-3-million-android-streaming-boxes-were-backdoored/ Source: Hacker News Title: 1.3M Android-Based TV Boxes Backdoored; Researchers Still Don’t Know How Feedly Summary: Comments AI Summary and Description: Yes Summary: The text provides an overview of a significant malware infection affecting around 1.3 million streaming devices using an open-source version of Android, which researchers have named Android.Vo1d. This malware…

  • Slashdot: 1.3 Million Android-Based TV Boxes Backdoored; Researchers Still Don’t Know How

    Source URL: https://it.slashdot.org/story/24/09/13/2117242/13-million-android-based-tv-boxes-backdoored-researchers-still-dont-know-how Source: Slashdot Title: 1.3 Million Android-Based TV Boxes Backdoored; Researchers Still Don’t Know How Feedly Summary: AI Summary and Description: Yes Summary: This report highlights a significant malware infection, Android.Vo1d, affecting 1.3 million streaming devices using an open-source version of Android across 200 countries. The infection reveals potential vulnerabilities in outdated operating…