backdoor

  • Blog

    Signal threatens to leave France if encryption backdoor required – Computerworld

    The underlying issue here is not limited to government encryption backdoors. If either side of an encrypted conversation is intercepted, the same problem occurs. The Ukrainian military, for example, is now fighting an aggressive phishing campaign that plants malware, oftentimes a keylogger, that bypasses the encryption even more effectively than would a backdoor. Endpoint interception has also turned around and…

    Read More »
  • Blog

    RansomHub ransomware uses new Betruger ‘multi-function’ backdoor

    ​A newly identified custom backdoor deployed in several recent ransomware attacks has been linked to at least one RansomHub ransomware-as-a-service (RaaS) operation affiliate. Symantec researchers who named this malware Betruger describe it as a “rare example of a multi-function backdoor” that was likely engineered for use in ransomware attacks. The malware’s capabilities include a wide range of capabilities that overlap…

    Read More »
  • Blog

    Juniper patches bug that let Chinese cyberspies backdoor routers

    ​Juniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access. This medium severity flaw (CVE-2025-21590) was reported by Amazon security engineer Matteo Memelli and is caused by an improper isolation or compartmentalization weakness. Successful exploitation lets local attackers with high privileges execute arbitrary code on vulnerable routers to compromise…

    Read More »
  • Blog

    Undocumented “backdoor” found in Bluetooth chip used by a billion devices

    The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented “backdoor” that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence. This was discovered by Spanish researchers Miguel Tarascó…

    Read More »
  • Blog

    Apple appeals UK encryption backdoor demand – Computerworld

    Let’s say that Apple lets the order stand and simply opts out of the UK market, which is essentially what it has already done, he said. That could encourage other governments, especially those in France, Australia, and Canada, to try the same tactic. “If that happens, then the [UK] government has set a precedent,” Chagnon said. But if Apple succeeds…

    Read More »
  • Blog

    US chides UK for seeking encryption backdoor – Computerworld

    A senior US official chided the UK government on Tuesday for pressuring Apple to create a backdoor in its encryption — although the US law enforcers would like a backdoor of their own. US national intelligence director Tulsi Gabbard responded to an inquiry from two members of Congress, writing that she is concerned about the UK’s request. “I share your…

    Read More »
  • Blog

    I think the UK government’s attempt to strong-arm Apple into giving it an ADP backdoor is a travesty – and so does most of the industry

    Earlier this month reports emerged that the UK government issued an order to Apple to give it access to users’ encrypted data, reigniting the debate around digital privacy. The issue centered around Apple’s Advanced Data Protection (ADP) tool, which is a feature that uses end-to-end encryption to ensure only users that are signed in on a trusted device can view…

    Read More »
  • Blog

    Chinese cyberspies use new SSH backdoor in network device hacks

    A Chinese hacking group is hijacking the SSH daemon on network appliances by injecting malware into the process for persistent access and covert operations. The newly identified attack suite has been used in attacks since mid-November 2024, attributed to the Chinese Evasive Panda, aka DaggerFly, cyber-espionage group. As per the findings of Fortinet’s Fortiguard researchers, the attack suite is named “ELF/Sshdinjector.A!tr” and…

    Read More »
  • Blog

    Backdoor found in two healthcare patient monitors, linked to IP in China

    The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device. CISA learned of the malicious behavior from an external researcher who disclosed the vulnerability to the agency. When CISA…

    Read More »
  • Blog

    FBI’s warrantless ‘backdoor’ searches ruled unconstitutional

    Following years of litigation, a federal court has finally ruled it unconstitutional for the FBI to search communications of US citizens collected under Section 702 of the Foreign Intelligence Surveillance Act (FISA). In a ruling unsealed last week, US District Court Judge LaShann DeArcy Hall decided that these “backdoor” searches violate the Fourth Amendment. This particular decision stems from a…

    Read More »
Back to top button
close