backdoor

  • Blog

    WordPress plugin disguised as a security tool injects backdoor

    A new malware campaign targeting WordPress sites employs a malicious plugin disguised as a security tool to trick users into installing and trusting it. According to Wordfence researchers, the malware provides attackers with persistent access, remote code execution, and JavaScript injection. At the same time, it remains hidden from the plugin dashboard to evade detection. Wordfence first discovered the malware…

    Read More »
  • Blog

    Over 16,000 Fortinet devices compromised with symlink backdoor

    Over 16,000 internet-exposed Fortinet devices have been detected as compromised with a new symlink backdoor that allows read-only access to sensitive files on previously compromised devices. This exposure is being reported by threat monitoring platform The Shadowserver Foundation, which initially reported 14,000 devices were exposed. Today, Shadowserver’s Piotr Kijewski told BleepingComputer that the cybersecurity organization now detects 16,620 devices impacted…

    Read More »
  • Blog

    Signal threatens to leave France if encryption backdoor required – Computerworld

    The underlying issue here is not limited to government encryption backdoors. If either side of an encrypted conversation is intercepted, the same problem occurs. The Ukrainian military, for example, is now fighting an aggressive phishing campaign that plants malware, oftentimes a keylogger, that bypasses the encryption even more effectively than would a backdoor. Endpoint interception has also turned around and…

    Read More »
  • Blog

    RansomHub ransomware uses new Betruger ‘multi-function’ backdoor

    ​A newly identified custom backdoor deployed in several recent ransomware attacks has been linked to at least one RansomHub ransomware-as-a-service (RaaS) operation affiliate. Symantec researchers who named this malware Betruger describe it as a “rare example of a multi-function backdoor” that was likely engineered for use in ransomware attacks. The malware’s capabilities include a wide range of capabilities that overlap…

    Read More »
  • Blog

    Juniper patches bug that let Chinese cyberspies backdoor routers

    ​Juniper Networks has released emergency security updates to patch a Junos OS vulnerability exploited by Chinese hackers to backdoor routers for stealthy access. This medium severity flaw (CVE-2025-21590) was reported by Amazon security engineer Matteo Memelli and is caused by an improper isolation or compartmentalization weakness. Successful exploitation lets local attackers with high privileges execute arbitrary code on vulnerable routers to compromise…

    Read More »
  • Blog

    Undocumented “backdoor” found in Bluetooth chip used by a billion devices

    The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented “backdoor” that could be leveraged for attacks. The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence. This was discovered by Spanish researchers Miguel Tarascó…

    Read More »
  • Blog

    Apple appeals UK encryption backdoor demand – Computerworld

    Let’s say that Apple lets the order stand and simply opts out of the UK market, which is essentially what it has already done, he said. That could encourage other governments, especially those in France, Australia, and Canada, to try the same tactic. “If that happens, then the [UK] government has set a precedent,” Chagnon said. But if Apple succeeds…

    Read More »
  • Blog

    US chides UK for seeking encryption backdoor – Computerworld

    A senior US official chided the UK government on Tuesday for pressuring Apple to create a backdoor in its encryption — although the US law enforcers would like a backdoor of their own. US national intelligence director Tulsi Gabbard responded to an inquiry from two members of Congress, writing that she is concerned about the UK’s request. “I share your…

    Read More »
  • Blog

    I think the UK government’s attempt to strong-arm Apple into giving it an ADP backdoor is a travesty – and so does most of the industry

    Earlier this month reports emerged that the UK government issued an order to Apple to give it access to users’ encrypted data, reigniting the debate around digital privacy. The issue centered around Apple’s Advanced Data Protection (ADP) tool, which is a feature that uses end-to-end encryption to ensure only users that are signed in on a trusted device can view…

    Read More »
  • Blog

    Chinese cyberspies use new SSH backdoor in network device hacks

    A Chinese hacking group is hijacking the SSH daemon on network appliances by injecting malware into the process for persistent access and covert operations. The newly identified attack suite has been used in attacks since mid-November 2024, attributed to the Chinese Evasive Panda, aka DaggerFly, cyber-espionage group. As per the findings of Fortinet’s Fortiguard researchers, the attack suite is named “ELF/Sshdinjector.A!tr” and…

    Read More »
Back to top button
close