Wednesday, August 7, 2019
Linux Backdoor

Linux Backdoor that Creates Fully Encrypted Reverse Shell and Attack Unsecured Linux Systems

A dangerous Linux backdoor Chaos that targeting improperly Secured Linux systems by using fully encrypted and integrity checked reverse shell. Hackers performing  SSH brute-force attacks on Linux systems that secured by weak password and executing the Chaos Backdoor. Chaos Backdoor was part of the  ‘sebd’...
IoT Backdoor

DoubleDoor – An IoT Botnet Bypasses Firewall Using Backdoor Exploits

IoT Backdoor exploits called Doubledoor have been discovered which allows bypassing an IoT layered security that leads to taking complete control of the targeting network systems. IoT based cyber Attacks are blooming since the number IoT devices are increasing rapidly...
Microsoft Office Vulnerabilities

New Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware that Creating Backdoor

Recently patched critical Microsoft office vulnerabilities are used for distributing powerful Zyklon Malware that has some sophisticated functionalities such as creating a backdoor in victims machine. Zyklon Malware has widely spread across the world since 2016 and its mainly targeting Telecommunications, Insurance,...
Backdoor

JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the server and the target hosts. Here I have used Kali Linux(Attacker Machine) and Victim Machine (Windows 10) Installation & Setup :- ...
Daserf Backdoor

A New Hacking Group Spreading Sophisticated “Daserf” Backdoor using Steganography

A new Cyber cyberespionage group called REDBALDKNIGHT Spreading advance Daserf Backdoor against Japanese based government agencies such as biotechnology, electronics manufacturing, and industrial chemistry systems. This sophisticated backdoor capable of performing some dangerous activities including execute shell commands, download and...
ethicalhackersacademy