backdoor

  • Blog

    Winnti hackers target other threat actors with new Glutton PHP backdoor

    ​The Chinese Winnti hacking group is using a new PHP backdoor named ‘Glutton’ in attacks on organizations in China and the U.S., and also in attacks on other cybercriminals. Chinese security firm QAX’s XLab discovered the new PHP malware in late April 2024, but evidence of its deployment, along with other files, dates back to December 2023. XLab comments that,…

    Read More »
  • Blog

    Hackers exploit ProjectSend flaw to backdoor exposed servers

    Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote access to servers. The flaw, tracked as CVE-2024-11680, is a critical authentication bug impacting ProjectSend versions before r1720, allowing attackers to send specially crafted HTTP requests to ‘options.php’ to change the application’s configuration. Successful exploitation allows the creation of rogue…

    Read More »
  • Blog

    Salt Typhoon hackers backdoor telcos with new GhostSpider malware

    The Chinese state-sponsored hacking group Salt Typhoon has been observed utilizing a new “GhostSpider” backdoor in attacks against telecommunication service providers. The backdoor was discovered by Trend Micro, which has been monitoring Salt Typhoon’s attacks against critical infrastructure and government organizations worldwide. Along with GhostSpider, Trend Micro discovered that the threat group also uses a previously documented Linux backdoor named…

    Read More »
  • Blog

    Amazon CEO Andy Jassy claims controversial RTO mandate is not a “backdoor layoff” strategy – but it’s a tactic that some execs admit to

    Amazon CEO Andy Jassy has pushed back on claims that the company’s controversial return to office (RTO) mandate was a thinly veiled attempt to encourage layoffs. Speaking at an all-hands meeting on 5 November, Jassy denied accusations that his recently announced RTO strategy was a “backdoor layoff”, insisting the move was motivated by improving the organization’s culture. “A number of…

    Read More »
  • Blog

    Fake Palo Alto GlobalProtect used as lure to backdoor enterprises

    Threat actors target Middle Eastern organizations with malware disguised as the legitimate Palo Alto GlobalProtect Tool that can steal data and execute remote PowerShell commands to infiltrate internal networks further. Palo Alto GlobalProtect is a legitimate security solution offered by Palo Alto Networks that provides secure VPN access with multi-factor authentication support. Organizations widely use the product to ensure remote employees,…

    Read More »
  • Blog

    Hackers use PHP exploit to backdoor Windows systems with new malware

    Unknown attackers have deployed a newly discovered backdoor dubbed Msupedge on a university’s Windows systems in Taiwan, likely by exploiting a recently patched PHP remote code execution vulnerability (CVE-2024-4577). CVE-2024-4577 is a critical PHP-CGI argument injection flaw patched in June that impacts PHP installations running on Windows systems with PHP running in CGI mode. It allows unauthenticated attackers to execute arbitrary code…

    Read More »
Back to top button
close