26 Sep 2019

Hackers Replace Windows Narrator to Get SYSTEM Level Access

Researchers with Cylance have uncovered a new hacking campaign that takes advantage of the Windows Narrator app that users can launch from the logon screen before they have entered their credentials. The attackers, who are believed to be operating from China, have developed a malicious version of the app that

Read More
10 Sep 2019

Public Exposure Does Little to Slow China-Based Thrip APT

Symantec warns that in the past year, Chinese cyber-espionage group Thrip has launched successful campaigns against no less than 12 military, telecom and satellite organizations across Southeast Asia. Evidently, a 2018 report by Symantec detailing Thrip’s activities has done little to deter the group. Thrip has adopted new malware in

Read More
10 Sep 2019

Stealth Falcon Targets Middle East with Windows BITS Feature

New ESET research reveals that Stealth Falcon, a cyber espionage group targeting political activists and journalists in the Middle East, has changed tactics and is currently using a backdoor relying on Windows Background Intelligent Transfer Service (BITS), instead of the PowerShell-based backdoor used by the group in previous campaigns. The

Read More
20 Aug 2019

Backdoor found in Webmin, a popular web-based utility for managing Unix servers

Security researchers have uncovered a backdoor in Webmin, a highly popular application for remotely managing Linux servers and other Unix-based systems. Threat actors could use the backdoor to take over machines running Webmin and subsequently target the remote systems being managed via the app. Webmin is installed on over 1

Read More
27 Jun 2019

Huawei security: Half its kit has ‘at least one potential backdoor’

Against a background of US-China trade tensions and a US ban on Huawei telecommunications equipment over security concerns, security researchers with Finite State claim that more than half of Huawei products come with “at least one potential backdoor”. In a report[pdf] released by the IoT security firm, Finite State mentions

Read More
19 Jun 2019

Modular Backdoor Can Spread Over Local Network

A new report by Kaspersky provides insight into Plurox, a highly sophisticated piece of malware first discovered in February. Plurox is a modular backdoor capable of distributing itself across networks and of planting additional malware on infected machines. Multi-functional “modular” malware is a growing threat to organizations. Plurox can infiltrate

Read More
10 Jun 2019

Microsoft Warns of Campaign Exploiting 2017 Bug

Microsoft is urging users to update a two-year-old vulnerability that is being used in a fresh wave of attacks. The flaw, tracked as CVE-2017-11882, was patched in 2017, but many unpatched systems remain vulnerable. The new campaign involves spam emails containing malicious RTF attachments capable of exploiting the vulnerability in order

Read More
08 May 2019

Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor

Notorious Russian hacking group Turla is using a highly sophisticated backdoor as part of a cyber espionage campaign targeting email servers, ESET researchers have discovered. The backdoor, dubbed LightNeuron, is the first of its kind “to be directly integrated into the working flow of Microsoft Exchange,” one of the researchers

Read More
01 May 2019

Vodafone Found Hidden Backdoors in Huawei Equipment

Vodafone has admitted to Bloomberg that it discovered backdoors in software for Huawei products used by the carrier to provide various services to customers in Italy. The backdoors were discovered between 2009 and 2011 and remained in place for years. As a result, Huawei could have obtained unauthorized access to

Read More
11 Apr 2019

US Government Warns of New North Korean Malware

The US Department of Homeland Security (DHS) has published a report about a newly uncovered malware strain that is linked to the infamous North Korean hacking group Hidden Cobra aka Lazarus. The malware, dubbed Hoplight, is a backdoor Trojan that has the ability to: “Read, Write, and Move Files; Enumerate

Read More