Security News

Turla Cyber-Spies Target European Government With Multiple Backdoors
2020-10-29 13:46

The Russia-linked cyber-espionage group known as Turla was recently observed targeting a European government organization with a combination of backdoors, security researchers at Accenture reveal. In a recent attack on such an organization in Europe, Turla was observed employing a combination of remote procedure call-based backdoors, including the HyperStack backdoor, and Kazuar and Carbon remote administration Trojans.

NSA: We've learned our lesson after foreign spies used one of our crypto backdoors – but we can't say how exactly
2020-10-28 23:44

It's said the NSA drew up a report on what it learned after a foreign government exploited a weak encryption scheme, championed by the US spying agency, in Juniper firewall software. On Wednesday, Reuters reporter Joseph Menn published an account of US Senator Ron Wyden's efforts to determine whether the NSA is still in the business of placing backdoors in US technology products.

Five Eyes nations plus Japan, India call for Big Tech to bake backdoors into everything
2020-10-11 23:51

The nations of the Five Eyes security alliance - Australia, Canada, New Zealand, the USA and the UK - plus Japan and India, have called on technology companies to design their products so they offer access to encrypted messages and content. Which is why the seven signatories to the Statement "Urge industry to address our serious concerns where encryption is applied in a way that wholly precludes any legal access to content".

FYI: If you're running HP Device Manager, anyone on your network can get admin on your server via backdoor
2020-09-30 08:32

HP Device Manager, software that allows IT administrators to manage HP Thin Client devices, comes with a backdoor database user account that undermines network security, a UK-based consultant has warned. Nicky Bloor, founder of Cognitous Cyber Security, reports that an HP Inc programmer appears to have set up an insecure user account in a database within HP Device Manager.

FYI: If you're running HP Device Manager, anyone on your network can get admin on your server via backdoor
2020-09-30 08:32

HP Device Manager, software that allows IT administrators to manage HP Thin Client devices, comes with a backdoor database user account that undermines network security, a UK-based consultant has warned. Nicky Bloor, founder of Cognitous Cyber Security, reports that an HP Inc programmer appears to have set up an insecure user account in a database within HP Device Manager.

Windows backdoor masquerading as VPN app installer
2020-09-22 12:05

Windows users looking to install a VPN app are in danger of downloading one that's been bundled with a backdoor, Trend Micro researchers warn. The trojanized installer is offered on third-party download sites and users who download and run it are unlikely to notice that something is wrong with it.

Video encoders using Huawei chips have backdoors and bad bugs – and Chinese giant says it's not to blame
2020-09-17 18:42

Hardware video encoders from multiple suppliers contain several critical security bugs that allow a remote unauthenticated miscreant to run arbitrary code on the equipment. Huawei insists the vulnerabilities were not introduced by its HiSilicon chips nor the SDK code it provides to manufacturers that use its components.

Cybercriminals Are Using Legit Cloud Monitoring Tools As Backdoor
2020-09-09 01:23

A cybercrime group that has previously struck Docker and Kubernetes cloud environments has evolved to repurpose genuine cloud monitoring tools as a backdoor to carry out malicious attacks, according to new research. "To our knowledge, this is the first time attackers have been caught using legitimate third party software to target cloud infrastructure," Israeli cybersecurity firm Intezer said in a Tuesday analysis.

Fileless worm builds cryptomining, backdoor-planting P2P botnet
2020-08-19 12:28

A fileless worm dubbed FritzFrog has been found roping Linux-based devices - corporate servers, routers and IoT devices - with SSH servers into a P2P botnet whose apparent goal is to mine cryptocurrency. Simultaneously the malware creates a backdoor on the infected machines, allowing attackers to access it at a later date even if the SSH password has been changed in the meantime.

Doki Backdoor Infiltrates Docker Servers in the Cloud
2020-07-30 17:00

A fresh Linux backdoor called Doki is infesting Docker servers in the cloud, researchers warn, employing a brand-new technique: Using a blockchain wallet for generating command-and-control domain names. The campaign starts with an increasingly common attack vector: The compromise of misconfigured Docker API ports.