framapiaf.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Un service Mastodon fourni par l'association d’éducation populaire Framasoft.

Administré par :

Statistiques du serveur :

1,4K
comptes actifs

#backdoor

9 messages8 participants0 message aujourd’hui

#Windows #RDP lets you log in using revoked passwords. #Microsoft is OK with that.

Researchers say the behavior amounts to a persistent #backdoor.

In response, Microsoft said the behavior is a “a design decision (...) As such, Microsoft said the behavior doesn’t meet the definition of a #security #vulnerability, and company engineers have no plans to change it.

arstechnica.com/security/2025/

Earth Kasha Updates TTPs in Latest Campaign Targeting Taiwan and Japan

Earth Kasha, an APT group believed to be part of APT10, has launched a new campaign in March 2025 targeting government agencies and public institutions in Taiwan and Japan. The campaign uses spear-phishing to deliver an updated version of the ANEL backdoor, potentially for espionage purposes. Key updates include a new command to support BOF execution in memory and the use of SharpHide for persistence. The second-stage backdoor, NOOPDOOR, now supports DNS over HTTPS for C&C communications. The attack chain involves compromised email accounts, malicious Excel files, and various evasion techniques. This campaign demonstrates Earth Kasha's continued evolution and poses significant geopolitical implications.

Pulse ID: 6813da43537c3d86e6ba3ca2
Pulse Link: otx.alienvault.com/pulse/6813d
Pulse Author: AlienVault
Created: 2025-05-01 20:32:02

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#APT10#BackDoor#CandC

🚨 Malicious WordPress Plugin Disguised as a Security Tool Injects Backdoor and Grants Admin Access

A new malware campaign is targeting WordPress sites by masquerading as a security plugin - but in reality, it installs a stealthy backdoor that gives attackers full control of the site.

🔍 Discovered by Wordfence, this fake plugin:
- Provides persistent remote access
- Executes arbitrary PHP code
- Injects malicious JavaScript into visitors' browsers
- Hides itself from the plugin dashboard to avoid detection

The infection centers around a tampered wp-cron[dot]php file that automatically activates the plugin - even if it's deleted.

Names used by the malicious plugin include:
- WP-antymalwary-bot.php
- wpconsole.php
- wp-performance-booster.php
- scr.php

Once triggered, the malware:
- Grants attacker admin access via a `GET` parameter with a cleartext password
- Allows PHP injection via a custom unauthenticated REST API
- Modifies `header.php` files and inserts base64-decoded JavaScript

📍 Clues in your logs? Watch for:
- `emergency_login`
- `check_plugin`
- `urlchange`
- `key`

🔒 WordPress admins - this is your wake-up call.

If your site relies on third-party themes or unmanaged plugins, it’s time to audit everything.

Backdoors disguised as helpful tools are becoming the norm - and once inside, they’re hard to find.

At @Efani we see too many breaches happen because “trusted” tools weren’t trustworthy. Security starts with visibility.

TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks

TheWizards, a China-aligned APT group, employs Spellbinder, a lateral movement tool for adversary-in-the-middle attacks through IPv6 SLAAC spoofing. This technique allows them to intercept network traffic and redirect legitimate Chinese software updates to malicious servers. The group targets individuals, gambling companies, and entities in Southeast Asia, UAE, China, and Hong Kong. Their malware chain includes the WizardNet backdoor and utilizes DNS hijacking to deliver malicious updates. Evidence links TheWizards to Sichuan Dianke Network Security Technology Co., Ltd. (UPSEC), suggesting it may be a digital quartermaster for this APT group. The attackers use sophisticated tools and techniques to evade detection and maintain persistence on compromised systems.

Pulse ID: 68124373bde0da2a4679b021
Pulse Link: otx.alienvault.com/pulse/68124
Pulse Author: AlienVault
Created: 2025-04-30 15:36:19

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

#Telegram vient d'envoyer un message privé groupé pour se plaindre d'une tentative de la #France de briser son chiffrement.

Autant je ne suis pas pour les #backdoor gouvernementales, autant perso j'ai lu "ouin ouin la France ouin ouin" suivi d'un pavé tentant de me faire croire qu'une entreprise super opaque en a quelque chose à faire de ma vie privée XD

Hackers Target Telegram Bot Developers with Backdoor npm Packages

Pulse ID: 6807da0d39c34032b80b0483
Pulse Link: otx.alienvault.com/pulse/6807d
Pulse Author: cryptocti
Created: 2025-04-22 18:03:57

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

ProtectEU threatens End-to-End-Encryption across VPNs, messaging apps, and secure email services.

This is part of a growing global trend where governments push for backdoors under the guise of national security. While aimed at combating crime, these proposals risk eroding digital privacy, weakening cybersecurity, and potentially driving privacy-focused services out of EU jurisdictions altogether.

forum.hashpwn.net/post/562