<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Backdoor &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/backdoor/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Sun, 29 Mar 2026 05:39:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Backdoor &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</title>
		<link>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/</link>
					<comments>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 19:14:56 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CVE20243094]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#LinuxVulnerability]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ssh]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#xz]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11512</guid>

					<description><![CDATA[<p>Red Hat has raised a critical alert after a supply chain attack was discovered in the widely used</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/xz-backdoor-vulnerability-linux/">xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Red Hat has raised a critical alert after a supply chain attack was discovered in the widely used xz compression tool. Security researchers found that certain recent versions of the library were tampered with, introducing hidden malicious functionality.</p>



<p>This issue, identified as <strong>CVE-2024-3094</strong>, impacts versions 5.6.0 and 5.6.1. The injected code is designed to stay hidden during normal review processes and only becomes active during the software build stage. Once active, it can interfere with SSH authentication, potentially allowing attackers to gain unauthorized access to affected systems.</p>



<h2 class="wp-block-heading">Technical Impact and Mitigation</h2>



<p>The attack is highly sophisticated, as the malicious components are not fully visible in the main source code. Instead, they rely on additional build-time elements to assemble and execute the payload. This makes detection difficult using standard code inspection methods.</p>



<p>Once deployed, the compromised library can alter how SSH authentication behaves, creating an opportunity for attackers to bypass normal security checks and access systems remotely.</p>



<p>Key highlights:</p>



<ul class="wp-block-list">
<li>CVE-2024-3094 affects xz and xz-libs versions 5.6.0 and 5.6.1</li>



<li>Malicious code is triggered during the build process</li>



<li>Targets SSH authentication mechanisms</li>



<li>Impacts Fedora Rawhide, Fedora 40 Beta, Debian unstable, and openSUSE</li>



<li>Red Hat Enterprise Linux (RHEL) remains unaffected</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">Immediate Actions</h3>



<ul class="wp-block-list">
<li>Downgrade to trusted xz version 5.4.x</li>



<li>Stop using Fedora Rawhide until systems are secured</li>



<li>Apply official patches and updates from Red Hat</li>



<li>Monitor systems for unusual SSH behavior</li>
</ul>



<p>Even though active exploitation has not been widely reported, the nature of this compromise makes it a high-risk issue. Prompt action is necessary to protect systems from potential unauthorized access.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/xz-backdoor-vulnerability-linux/">xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mirai Botnets Now Driving DDoS and Proxy Abuse</title>
		<link>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/</link>
					<comments>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 15:08:45 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#BotnetActivity]]></category>
		<category><![CDATA[#Botnets]]></category>
		<category><![CDATA[#C2Servers]]></category>
		<category><![CDATA[#CyberAttacks]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DDoS]]></category>
		<category><![CDATA[#DDoSAttack]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#IoTBotnet]]></category>
		<category><![CDATA[#IoTSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#Mirai]]></category>
		<category><![CDATA[#MiraiBotnet]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#ProxyAbuse]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11502</guid>

					<description><![CDATA[<p>Mirai botnets are rapidly evolving into powerful platforms used for large-scale DDoS attacks and proxy abuse across IoT</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/">Mirai Botnets Now Driving DDoS and Proxy Abuse</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Mirai botnets are rapidly evolving into powerful platforms used for large-scale DDoS attacks and proxy abuse across IoT and mobile devices.</p>



<p>Researchers observed over 21,000 command-and-control (C2) servers between July and December 2025. Along with this growth, attackers are increasingly using infected devices as residential proxies, not just for DDoS attacks.</p>



<p>This rise also aligns with a surge in massive DDoS campaigns. Reports highlight “hyper-volumetric” attacks, including one reaching 31.4 Tbps, showing how far these botnets have evolved. At the same time, botnet activity has sharply increased after a period of stability, indicating a renewed wave of large-scale operations.</p>



<h2 class="wp-block-heading"><strong>Evolution of Mirai-Based Botnets</strong></h2>



<p>Mirai first appeared in 2016, targeting internet-connected devices such as routers and IoT systems that often rely on weak or default credentials. Once compromised, these devices are added to a botnet that can launch high-volume traffic floods across multiple layers.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="750" height="686" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-5.png" alt="" class="wp-image-11503" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-5-300x274.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-5.png 750w" sizes="(max-width: 750px) 100vw, 750px" /><figcaption class="wp-element-caption">Top regions hosting botnet C2 infrastructure (Source: Spamhaus).<br></figcaption></figure>



<p>The public release of Mirai’s source code played a major role in its growth. It allowed attackers to create multiple variants, each adding new capabilities while keeping the core attack techniques intact.</p>



<p>One well-known variant, Satori, rapidly spread by exploiting vulnerabilities in routers, especially through command injection flaws. It used automated scripts to download and execute malware across different device architectures, allowing infections to scale quickly without user interaction.</p>



<h2 class="wp-block-heading">Expanding Capabilities and Abuse Techniques</h2>



<p>Modern Mirai botnets are no longer limited to DDoS attacks. They are now being used in more advanced and flexible ways, increasing their overall impact.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1000" height="563" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-6.png" alt="" class="wp-image-11504" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-6-300x169.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-6-768x432.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-6.png 1000w" sizes="(max-width: 1000px) 100vw, 1000px" /><figcaption class="wp-element-caption">Botnets used in brute-force attacks (Source: Spamhaus).<br></figcaption></figure>



<p>Key capabilities seen in recent campaigns include:</p>



<ul class="wp-block-list">
<li>Large-scale DDoS attacks reaching record-breaking volumes</li>



<li>Use of infected devices as residential proxy networks</li>



<li>Automated exploitation of IoT vulnerabilities</li>



<li>Multi-architecture malware deployment for wider coverage</li>



<li>Stealthier operations to avoid detection</li>
</ul>



<h2 class="wp-block-heading">Aisuru-Kimwolf Expanding DDoS and Proxy Abuse</h2>



<p>Newer botnet families like Aisuru and Kimwolf have taken Mirai-based threats to the next level. These botnets are now used not only for massive DDoS attacks but also as residential proxy networks that can be rented for cybercrime activities.</p>



<p>Security reports have linked Aisuru-Kimwolf to extremely large attacks, including one reaching 31.4 Tbps. These attacks often generate massive traffic with billions of packets per second, using random patterns to avoid basic detection and filtering systems.</p>



<p>At the same time, Kimwolf, which targets Android devices, is being used to exploit residential proxy services. Attackers use these networks to access internal systems, infect devices like smart TVs and smartphones, and then sell that access for activities such as fraud and credential stuffing.</p>



<h2 class="wp-block-heading">Ongoing Threat and Defensive Focus</h2>



<p>Law enforcement and tech companies have started taking action against these botnets by targeting their command-and-control infrastructure and disrupting the platforms used to manage proxy networks.</p>



<p>However, these efforts have not fully stopped the threat. Mirai-based botnets continue to survive and grow because many devices remain unpatched, especially routers and Android systems. Attackers can also quickly rebuild their infrastructure after disruptions.</p>



<p>For defenders, the focus should remain on strong basic security practices:</p>



<ul class="wp-block-list">
<li>Keep routers and IoT devices updated</li>



<li>Monitor unusual outbound traffic</li>



<li>Secure Android and edge devices</li>



<li>Track indicators linked to Mirai variants</li>
</ul>



<p>As these botnets continue to evolve, they are becoming more powerful and more versatile, combining large-scale disruption with stealthy abuse of network access.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/">Mirai Botnets Now Driving DDoS and Proxy Abuse</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access</title>
		<link>https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/</link>
					<comments>https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 13:19:00 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[wordpress]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MuPlugins]]></category>
		<category><![CDATA[#WebsiteSecurity]]></category>
		<category><![CDATA[#WordPressSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10414</guid>

					<description><![CDATA[<p>A highly sophisticated WordPress malware campaign has been uncovered, exploiting the seldom-monitored mu-plugins (must-use plugins) directory to gain</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/">Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A highly sophisticated WordPress malware campaign has been uncovered, exploiting the seldom-monitored <em>mu-plugins</em> (must-use plugins) directory to gain persistent access to compromised sites while avoiding detection by conventional security tools.</p>



<p>At the core of this attack is a malicious file named <code>wp-index.php</code>, which abuses WordPress’s must-use plugin functionality to ensure continuous operation that cannot be disabled via the standard admin dashboard.</p>



<p>The malware uses advanced <a href="https://blog.sucuri.net/2025/07/uncovering-a-stealthy-wordpress-backdoor-in-mu-plugins.html" target="_blank" rel="noopener"><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-cyan-blue-color">obfuscation</mark></a> techniques, including ROT13 encoding, to conceal its communications with a remote command-and-control server.</p>



<p>Once executed, the malware fetches payloads from a hidden URL and stores them directly in the WordPress database under the option key <code>_hdra_core</code>. This tactic allows it to evade security solutions that focus mainly on filesystem changes.</p>



<p>Security researchers at Sucuri discovered this stealthy backdoor during routine investigations, highlighting its unusually effective persistence mechanisms across various infection vectors.</p>



<p>Notably, the malware creates a covert administrative user account named <strong>“officialwp”</strong> and uses WordPress filter functions to hide this account from the dashboard, masking its presence from site administrators.</p>



<p>The infection process is highly sophisticated, with the main loader script downloading base64-encoded payloads from <code>hxxps://1870y4rr4y3d1k757673q[.]xyz/cron.php</code>. When decoded, these payloads reveal a complete and robust malware framework.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="159" src="https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1024x159.png" alt="" class="wp-image-10415" srcset="https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-200x31.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-300x47.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-400x62.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-600x93.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-768x119.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-800x124.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1024x159.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1200x187.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-4-1536x239.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>The malware framework also incorporates a stealthy file manager, deceptively named “pricing-table-3.php”, which is placed within the active theme directory. This backdoor tool is shielded by a custom authentication token — “fsociety_OwnzU_4Evr_1337H4x!” — that must be sent via HTTP headers to gain access, adding an additional layer of concealment and control for the attackers.</p>



<h2 class="wp-block-heading"><strong>Database-Centric Persistence Strategy</strong></h2>



<p>The most alarming aspect of this malware is its database-centric persistence strategy. Instead of depending on traditional file-based infections—often detectable through file integrity monitoring—the backdoor embeds its payload within WordPress’s options table. It then executes this stored code and swiftly removes any temporary files created during the process, effectively minimizing forensic traces and making detection significantly more difficult.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="439" height="78" src="https://firsthackersnews.com/wp-content/uploads/2025/07/image-5.png" alt="" class="wp-image-10416" srcset="https://firsthackersnews.com/wp-content/uploads/2025/07/image-5-200x36.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-5-300x53.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-5-400x71.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/07/image-5.png 439w" sizes="auto, (max-width: 439px) 100vw, 439px" /></figure>



<p>This technique enables the malware to withstand typical cleanup procedures, ensuring its continued presence even after superficial disinfection attempts. By storing and executing its payload from the database, the attackers retain <strong>remote code execution capabilities</strong> and <strong>full administrative control</strong> over the compromised WordPress site, making the infection both resilient and deeply embedded.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/">Stealthy Backdoor Discovered in WordPress Plugins Grants Hackers Long-Term Website Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wordpress-mu-plugins-malware-backdoor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Detecting Deep Learning Backdoors: The DeBackdoor Approach</title>
		<link>https://firsthackersnews.com/detecting-deep-learning-backdoors-the-debackdoor-approach/</link>
					<comments>https://firsthackersnews.com/detecting-deep-learning-backdoors-the-debackdoor-approach/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 28 Mar 2025 17:37:58 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[DeBackdoor]]></category>
		<category><![CDATA[deep learning backdoors]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=9896</guid>

					<description><![CDATA[<p>Researchers from Qatar Computing Research Institute and Mohamed bin Zayed University developed DeBackdoor, a framework to detect hidden</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/detecting-deep-learning-backdoors-the-debackdoor-approach/">Detecting Deep Learning Backdoors: The DeBackdoor Approach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">Researchers from Qatar Computing Research Institute and Mohamed bin Zayed University developed DeBackdoor, a framework to detect hidden backdoor attacks in deep learning models used in critical systems like self-driving cars and medical devices.</span></p>



<h2 class="wp-block-heading"><strong>All about DeBackdoor</strong><span class="" data-state="closed"><span class="flex h-[30px] w-[30px] items-center justify-center"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 5C7 3.34315 8.34315 2 10 2H19C20.6569 2 22 3.34315 22 5V14C22 15.6569 20.6569 17 19 17H17V19C17 20.6569 15.6569 22 14 22H5C3.34315 22 2 20.6569 2 19V10C2 8.34315 3.34315 7 5 7H7V5ZM9 7H14C15.6569 7 17 8.34315 17 10V15H19C19.5523 15 20 14.5523 20 14V5C20 4.44772 19.5523 4 19 4H10C9.44772 4 9 4.44772 9 5V7ZM5 9C4.44772 9 4 9.44772 4 10V19C4 19.5523 4.44772 20 5 20H14C14.5523 20 15 19.5523 15 19V10C15 9.44772 14.5523 9 14 9H5Z" fill="currentColor"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M12.1318 2.50389C12.3321 2.15338 12.7235 1.95768 13.124 2.00775L13.5778 2.06447C16.0449 2.37286 17.636 4.83353 16.9048 7.20993L16.354 8.99999H17.0722C19.7097 8.99999 21.6253 11.5079 20.9313 14.0525L19.5677 19.0525C19.0931 20.7927 17.5124 22 15.7086 22H6C4.34315 22 3 20.6568 3 19V12C3 10.3431 4.34315 8.99999 6 8.99999H8C8.25952 8.99999 8.49914 8.86094 8.6279 8.63561L12.1318 2.50389ZM10 20H15.7086C16.6105 20 17.4008 19.3964 17.6381 18.5262L19.0018 13.5262C19.3488 12.2539 18.391 11 17.0722 11H15C14.6827 11 14.3841 10.8494 14.1956 10.5941C14.0071 10.3388 13.9509 10.0092 14.0442 9.70591L14.9932 6.62175C15.3384 5.49984 14.6484 4.34036 13.5319 4.08468L10.3644 9.62789C10.0522 10.1742 9.56691 10.5859 9 10.8098V19C9 19.5523 9.44772 20 10 20ZM7 11V19C7 19.3506 7.06015 19.6872 7.17071 20H6C5.44772 20 5 19.5523 5 19V12C5 11.4477 5.44772 11 6 11H7Z" fill="currentColor"></path><path fill-rule="evenodd" clip-rule="evenodd" d="M11.8727 21.4961C11.6725 21.8466 11.2811 22.0423 10.8805 21.9922L10.4267 21.9355C7.95958 21.6271 6.36855 19.1665 7.09975 16.7901L7.65054 15H6.93226C4.29476 15 2.37923 12.4921 3.0732 9.94753L4.43684 4.94753C4.91145 3.20728 6.49209 2 8.29589 2H18.0045C19.6614 2 21.0045 3.34315 21.0045 5V12C21.0045 13.6569 19.6614 15 18.0045 15H16.0045C15.745 15 15.5054 15.1391 15.3766 15.3644L11.8727 21.4961ZM14.0045 4H8.29589C7.39399 4 6.60367 4.60364 6.36637 5.47376L5.00273 10.4738C4.65574 11.746 5.61351 13 6.93226 13H9.00451C9.32185 13 9.62036 13.1506 9.8089 13.4059C9.99743 13.6612 10.0536 13.9908 9.96028 14.2941L9.01131 17.3782C8.6661 18.5002 9.35608 19.6596 10.4726 19.9153L13.6401 14.3721C13.9523 13.8258 14.4376 13.4141 15.0045 13.1902V5C15.0045 4.44772 14.5568 4 14.0045 4ZM17.0045 13V5C17.0045 4.64937 16.9444 4.31278 16.8338 4H18.0045C18.5568 4 19.0045 4.44772 19.0045 5V12C19.0045 12.5523 18.5568 13 18.0045 13H17.0045Z" fill="currentColor"></path></span></span></h2>



<p>In many cases, developers acquire deep learning models from third-party sources without access to training data or the ability to inspect the model’s internals, making backdoor detection difficult. Most existing methods require access to the model&#8217;s architecture, training data, or multiple instances. </p>



<p>DeBackdoor overcomes these challenges by using a deductive approach to generate potential triggers and a search technique to identify the most effective ones. It focuses on optimizing the Attack Success Rate (ASR), a key metric for evaluating the success of backdoor attacks.</p>



<h2 class="wp-block-heading"><strong>How it detects</strong></h2>



<p>DeBackdoor&#8217;s detection methodology involves defining a search space for potential trigger templates based on the attack&#8217;s description. It then applies Simulated Annealing (SA), a stochastic search technique, to iteratively generate and test candidate triggers. </p>



<p>SA is chosen for its ability to avoid local minima, allowing for a more thorough exploration of the trigger space compared to simpler methods like Hill Climbing. </p>



<p>By applying these triggers to a small set of clean inputs and assessing the model’s responses, DeBackdoor can identify if the model is backdoored. </p>



<p>The framework has shown high detection performance across various attack scenarios, including different trigger types and label strategies such as All2One, All2All, and One2One.</p>



<p>DeBackdoor outperforms existing detection baselines like AEVA and B3D, which are limited in scope and effectiveness. </p>



<p>Its adaptability makes it especially valuable in situations where the attack strategy is unknown or varies, offering a strong solution for securing deep learning models in critical applications.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong><span class="" data-state="closed"><path d="M3.06957 10.8763C3.62331 6.43564 7.40967 3 12 3C14.2824 3 16.4028 3.85067 18.0118 5.25439V4C18.0118 3.44772 18.4595 3 19.0118 3C19.5641 3 20.0118 3.44772 20.0118 4V8C20.0118 8.55228 19.5641 9 19.0118 9H15C14.4477 9 14 8.55228 14 8C14 7.44772 14.4477 7 15 7H16.9571C15.6757 5.76379 13.9101 5 12 5C8.43108 5 5.48466 7.67174 5.0542 11.1237C4.98586 11.6718 4.48619 12.0607 3.93815 11.9923C3.39011 11.924 3.00123 11.4243 3.06957 10.8763ZM20.0618 12.0077C20.6099 12.076 20.9988 12.5757 20.9304 13.1237C20.3767 17.5644 16.5903 21 12 21C9.72322 21 7.60762 20.1535 5.99999 18.7559V20C5.99999 20.5523 5.55228 21 4.99999 21C4.44771 21 3.99999 20.5523 3.99999 20V16C3.99999 15.4477 4.44771 15 4.99999 15H8.99999C9.55228 15 9.99999 15.4477 9.99999 16C9.99999 16.5523 9.55228 17 8.99999 17H7.04285C8.32433 18.2362 10.0899 19 12 19C15.5689 19 18.5153 16.3283 18.9458 12.8763C19.0141 12.3282 19.5138 11.9393 20.0618 12.0077Z" fill="currentColor"></path><span class="overflow-hidden text-clip whitespace-nowrap text-sm"></span></span></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/detecting-deep-learning-backdoors-the-debackdoor-approach/">Detecting Deep Learning Backdoors: The DeBackdoor Approach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/detecting-deep-learning-backdoors-the-debackdoor-approach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WarmCookie malware spreads via fake update campaign in France</title>
		<link>https://firsthackersnews.com/warmcookie/</link>
					<comments>https://firsthackersnews.com/warmcookie/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 04 Oct 2024 16:09:50 +0000</pubDate>
				<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[fake update campaign]]></category>
		<category><![CDATA[fakeupdate]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[WarmCookie malware]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8852</guid>

					<description><![CDATA[<p>FakeUpdate, a fake browser update scam, is now targeting users in France, aiming to deploy the WarmCookie backdoor</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/warmcookie/">WarmCookie malware spreads via fake update campaign in France</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>FakeUpdate, a fake browser update scam, is now targeting users in France, aiming to deploy the WarmCookie backdoor malware.</p>



<h2 class="wp-block-heading"><strong>FakeUpdate Spreads WarmCookie as Chrome, Edge Updates</strong></h2>



<p><br>Researchers at Gen Threat Labs have found a campaign spreading the WarmCookie backdoor. This campaign uses a known tactic called FakeUpdate, which tricks victims into downloading fake web browser updates. </p>



<p>Currently, the attacks are targeting users in France. In addition to popular browsers like Google Chrome, Mozilla Firefox, and Microsoft Edge, the campaign also offers “updates” for applications like Java, VMware Workstation, Proton VPN, and WebEx. Attackers either hack or create websites that display fake update requests. Following these requests leads to the download of a malicious program disguised as a browser update.</p>



<p>The FakeUpdate campaign is not new, as similar ones have existed before. WarmCookie has also previously used deceptive methods for distribution, such as job offers. </p>



<p>This updated version now enables data theft, device profiling, program enumeration, command execution, screenshot capture, and installation of additional malware.</p>



<p>The FakeUpdate site closely resembles a legitimate one, with a convincing URL. Currently, the site edgeupgrade[.]com is still active. Clicking the &#8220;Update&#8221; button downloads the file “Install_x64.exe,” which is the WarmCookie backdoor. Once launched, the malware checks for a virtual environment. If none is found, it collects the system fingerprint and sends it to the attackers’ command and control server.</p>



<p>The WarmCookie backdoor gives attackers full access to compromised systems, with new features like running DLLs from the temp folder and executing EXE and PowerShell files. This allows for basic data theft and the delivery of payloads like ransomware. All modern browsers on Windows now auto-update, removing the need for manual downloads; users just need to restart the browser.</p>



<p><strong>How to stay protected from malware and online threats:</strong></p>



<ul class="wp-block-list">
<li><strong>Keep Software Updated</strong>: Regularly update your operating system, web browsers, and applications to patch vulnerabilities.</li>



<li><strong>Use Antivirus Software</strong>: Install reputable antivirus or anti-malware programs and keep them updated to detect and remove threats.</li>



<li><strong>Enable Firewalls</strong>: Use a firewall to monitor incoming and outgoing network traffic and block suspicious activity.</li>



<li><strong>Avoid Suspicious Links</strong>: Be cautious when clicking on links or downloading files from unknown sources, especially in emails or pop-ups.</li>



<li><strong>Use Strong Passwords</strong>: Create complex passwords and consider using a password manager to keep track of them.</li>



<li><strong>Enable Two-Factor Authentication (2FA)</strong>: Use 2FA wherever possible for an added layer of security on your accounts.</li>



<li><strong>Backup Data</strong>: Regularly back up important files to an external drive or cloud storage to prevent data loss in case of an attack.</li>



<li><strong>Educate Yourself</strong>: Stay informed about the latest threats and learn how to recognize phishing attempts and other scams.</li>



<li><strong>Limit Privileges</strong>: Run applications with the least privilege necessary and avoid using administrative accounts for everyday tasks.</li>



<li><strong>Monitor System Behavior</strong>: Keep an eye on system performance for unusual activity, such as unexpected slowdowns or unauthorized changes.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/warmcookie/">WarmCookie malware spreads via fake update campaign in France</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/warmcookie/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Loki Backdoor Targets macOS Systems</title>
		<link>https://firsthackersnews.com/loki-backdoor/</link>
					<comments>https://firsthackersnews.com/loki-backdoor/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 12 Sep 2024 16:37:08 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[MacOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Loki Backdoor]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8681</guid>

					<description><![CDATA[<p>Cody Thomas created Apfell in 2018, an open-source macOS post-exploitation framework that later evolved into Mythic, a cross-platform</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/loki-backdoor/">New Loki Backdoor Targets macOS Systems</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cody Thomas created Apfell in 2018, an open-source macOS post-exploitation framework that later evolved into Mythic, a cross-platform framework addressing the limits of existing tools.</p>



<h2 class="wp-block-heading"><strong>Loki Backdoor </strong></h2>



<p>Mythic offers a unified interface for managing agents across platforms, allowing flexibility and customization to create agents with specific features.</p>



<p>The official Mythic repository now has over two dozen agents, including the Loki agent, which uses a modified djb2 hashing algorithm to obscure API functions and commands, differing from the original Havoc agent by using a different magic number (2231).</p>



<p>The hash is calculated by shifting the value left by 5 bits, adding the original hash and current character, making the agent&#8217;s behavior harder to analyze and detect.</p>



<p>The Loki loader malware sends encrypted data about the infected system to a command-and-control server. The server responds by sending a DLL, which the loader runs in the device&#8217;s memory to handle further communication.</p>



<p>Both the May and July versions use similar encryption methods, but differ slightly in how they handle data and UUIDs. The May version sends a plaintext UUID, while the July version encodes it. After connecting, the loader passes control to the DLL, which carries out the malicious tasks.</p>



<p>The malware, stagger_1.1.dll, is a Windows x64 executable based on the Havoc agent, using hashed commands for file transfer, process management, and environment control. While it lacks native traffic tunneling, attackers use tools like ngrok or gTunnel to access private networks, loading them in memory to avoid detection.</p>



<p>According to Securelist, Russian companies across various industries have been targeted by a sophisticated malware campaign, likely delivered through email attachments. Attackers, using publicly available tools, have compromised over a dozen organizations.</p>



<p>Victims were tricked into opening malicious files, leading to the installation of Loki malware. Attribution remains difficult due to the use of common tools and evasive tactics.</p>



<p>Open-source post-exploitation frameworks like the July and May loaders are increasingly used to remotely control victim devices, often evading detection. Indicators of compromise include specific file hashes, network traffic, and C2 addresses. gTunnel and ngrok are key tools for tunneling and communication.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/loki-backdoor/">New Loki Backdoor Targets macOS Systems</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/loki-backdoor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ToddyCat APT Exploits SMB and IKEEXT RCE to Deploy ICMP Backdoor</title>
		<link>https://firsthackersnews.com/toddycat-apt-2/</link>
					<comments>https://firsthackersnews.com/toddycat-apt-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 04 Sep 2024 17:22:42 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[ToddyCat APT]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8633</guid>

					<description><![CDATA[<p>ToddyCat is an APT group active since December 2020, targeting government and military entities in Europe and Asia.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/toddycat-apt-2/">ToddyCat APT Exploits SMB and IKEEXT RCE to Deploy ICMP Backdoor</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ToddyCat is an APT group active since December 2020, targeting government and military entities in Europe and Asia. Known for sophisticated cyber-espionage, Kaspersky Lab found ToddyCat exploiting SMB, IKEEXT, and Exchange RCE to deploy an ICMP backdoor.</p>



<h2 class="wp-block-heading"><strong>ToddyCat APT </strong></h2>



<p>In 2023, Kaspersky GERT uncovered a major internal fraud in a government organization, where threat actors used an internal service to steal over $20 million.</p>



<p>GERT’s DFIR analysis uncovered several attack vectors:</p>



<ul class="wp-block-list">
<li>A debugging interface vulnerability for cookie theft and user impersonation.</li>



<li>Privilege escalation and account manipulation for fraudulent transactions.</li>



<li>Unauthorized VPN access from external and internal networks.</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="576" src="https://firsthackersnews.com/wp-content/uploads/2024/09/image-1.png" alt="" class="wp-image-8634" srcset="https://firsthackersnews.com/wp-content/uploads/2024/09/image-1-200x113.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1-300x169.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1-400x225.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1-600x338.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1-768x432.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1-800x450.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/09/image-1.png 1024w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Source – Securelist</em></figcaption></figure>



<p>The team connected user activities across different systems, including both local and remote IDs, to confirm that internal actors were working together. </p>



<p>This case highlights the critical need for strong internal controls, effective privileged access management, and comprehensive logging to identify and address insider threats in financial systems. Additionally, Kaspersky uncovered a sophisticated attack that had been ongoing in a customer’s infrastructure for over two years, revealing the depth and persistence of the intrusion.</p>



<p>The Flax Typhoon APT group used living-off-the-land techniques, misusing SoftEther VPN and Zabbix agent for unintended purposes. They deployed malware via Windows LOLBins like certutil and disguised services to avoid detection. </p>



<p>The attack involved NTDS dumping, Mimikatz, and CobaltStrike, including creating firewall rules for hidden communication. As a result, the client successfully sued the insider employee and accomplices, highlighting the critical need for APT detection solutions to identify and eliminate long-term threats.</p>



<p>GERT’s assessment confirmed the attack timeline, compromised users, and execution methods. The investigation revealed SMB abuse, IKEEXT service persistence, and the CVE-2021-26855 vulnerability in Microsoft Exchange Servers. </p>



<p>A malicious wlbsctrl.dll was used for persistence and lateral movement via SMB. An ICMP backdoor was found embedded in an application, featuring mutex checking, registry manipulation, and encrypted payload execution.</p>



<p>The backdoor used AES encryption with the C drive&#8217;s volume serial number as a key parameter. Payloads were injected into dllhost.exe, creating ICMP sockets, receiving Base64 data, and using encrypted shellcodes. </p>



<p>While the attack shows ToddyCat’s TTPs, full attribution is unclear. The case underscores the importance of asset surveillance, threat intelligence, and MDR services.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/toddycat-apt-2/">ToddyCat APT Exploits SMB and IKEEXT RCE to Deploy ICMP Backdoor</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/toddycat-apt-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware</title>
		<link>https://firsthackersnews.com/log4j-vulnerability/</link>
					<comments>https://firsthackersnews.com/log4j-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 22 Aug 2024 15:38:06 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Backdoors]]></category>
		<category><![CDATA[Crypto-Mining Malware]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Log4j Vulnerability]]></category>
		<category><![CDATA[malicious scripts]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8536</guid>

					<description><![CDATA[<p>Recent Log4j attacks use obfuscated LDAP requests to execute malicious scripts, establish persistence, and exfiltrate data. Multiple backdoors</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/log4j-vulnerability/">Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Recent Log4j attacks use obfuscated LDAP requests to execute malicious scripts, establish persistence, and exfiltrate data. Multiple backdoors and encrypted channels maintain control, emphasizing the ongoing threat of the Log4j vulnerability, initially discovered in November 2021 with a CVSS score of 10.</p>



<h2 class="wp-block-heading"><strong>Log4j Vulnerability Exploited Again</strong></h2>



<p>On July 30, 2024, a Confluence honeypot detected an exploitation attempt of the Log4Shell vulnerability originating from a known Tor exit node, 185.220.101 [34]. This incident marked the start of a new campaign by opportunistic threat actors. Upon deeper investigation, it was uncovered that the attackers were leveraging the Log4Shell vulnerability, a critical flaw in the Apache Log4j library, to deploy XMRig, a popular cryptocurrency mining software.</p>



<p>The Log4Shell vulnerability, initially discovered in November 2021, has a CVSS score of 10, indicating its high severity. It allows attackers to execute arbitrary code remotely, making it a prime target for exploitation. In this case, attackers used the vulnerability to gain unauthorized access to systems, where they then installed XMRig to mine cryptocurrency, effectively hijacking the system&#8217;s resources for their gain.</p>



<p>This event underscores the ongoing risk posed by the Log4Shell vulnerability, even years after its discovery.</p>



<p>An attacker exploited a Log4j vulnerability by sending an obfuscated payload with an LDAP URL. This caused the vulnerable Java application to download and run a malicious Java class from a remote server. The class then retrieved another script (&#8220;lte&#8221;) and executed it with root privileges. While the script&#8217;s exact purpose is unclear, its ability to run any command suggests it could be used for more harmful actions.</p>



<p>Additionally, the malicious Java class downloaded a hidden Bash script that scanned the system, installed a cryptocurrency miner, set up persistence through systemd or cron jobs, and created reverse shells for remote access.</p>



<p>The script collects detailed system information like CPU specs, OS version, user data, network connections, running processes, and system uptime, sending this data to a remote server via an HTTP POST request.</p>



<p>To avoid detection, it self-destructs by overwriting the bash history and erasing the current shell&#8217;s command history.</p>



<p>DataDog&#8217;s investigation into possible Log4Shell exploitation uncovered several indicators of compromise, including the suspicious IP address 185.220.101.34 and domains like superr.buzz and cmpnst.info. They also found suspicious file paths like /tmp/lte, suggesting attempts to exploit the vulnerability for unauthorized access.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/log4j-vulnerability/">Log4j Vulnerability Exploited Again to Deploy Crypto-Mining Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/log4j-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Backdoor in MIFARE Smart Cards Reveals User-Defined Keys</title>
		<link>https://firsthackersnews.com/mifare-smart-cards/</link>
					<comments>https://firsthackersnews.com/mifare-smart-cards/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 21 Aug 2024 20:02:50 +0000</pubDate>
				<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[MIFARE smart cards]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8532</guid>

					<description><![CDATA[<p>Researchers uncover new attack vectors in MIFARE Classic cards by analyzing the CRYPTO-1 algorithm and vulnerabilities, demonstrating how</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mifare-smart-cards/">Backdoor in MIFARE Smart Cards Reveals User-Defined Keys</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Researchers uncover new attack vectors in MIFARE Classic cards by analyzing the CRYPTO-1 algorithm and vulnerabilities, demonstrating how to extract data, clone cards, and compromise both new and old card generations.</p>



<p>The research leads to optimized attack tools and a thorough understanding of vulnerabilities, highlighting the urgent need to replace MIFARE Classic in modern applications.</p>



<p>It explores vulnerabilities in MIFARE Classic memory cards using the CRYPTO-1 protocol, analyzing card-only attacks that exploit weaknesses like predictable nonce generation and parity bit leaks.</p>



<p>The FM11RF08S card is introduced as a response to vulnerabilities in MIFARE Classic, featuring countermeasures such as a static encrypted nonce for nested authentication and a repeatable initial nonce generated by a Linear Feedback Shift Register (LFSR). However, researchers discovered a backdoor in FM11RF08S RFID tags by analyzing the tags&#8217; responses to unexpected commands. They uncovered a hidden authentication method that bypasses the standard security measures of the card.</p>



<p>This backdoor allows attackers full read access to all tag data, including blocks that were previously inaccessible. Additionally, the researchers developed a technique to recover the main encryption key, rendering the tag’s security mechanisms ineffective and compromising the overall security of the FM11RF08S card.</p>



<p>It weakens the security of many RFID systems using this tag model, highlighting the urgent need for robust security in embedded systems.</p>



<p>They discovered and exploited a backdoor in FM11RF08 and FM11RF08S MIFARE Classic clones, significantly speeding up key recovery attacks. By targeting keyA and keyB together and optimizing the search process, they cut attack time by six times. </p>



<p>They also found a universal backdoor key for older FM11RF08 models and FM1208-10 devices, allowing rapid key extraction and posing major security risks. Testing revealed that some non-Fudan cards unexpectedly accept backdoor commands with the same key used by Fudan FM11RF08 cards.</p>



<p>Certain cards, like NXP MF1ICS5005, MF1ICS5006, MF1ICS5007, and USCUID/GDM magic cards, respond to backdoor commands using standard keyA/keyB authentication. The darknested attack is especially effective against SLE66R35, MF1ICS5003, and MF1ICS5004 due to its slower key recovery process compared to the darkside attack. Researchers have found a critical hardware backdoor in the FM11RF08S MIFARE Classic chip, allowing previously unachievable attacks on card data, including cloning.</p>



<p>The backdoor in FM11RF08 chips, present since 2007, undermines their security and affects global systems. The same key is also found on older NXP and Infineon cards. This highlights the need for infrastructure audits and migration to more secure alternatives. Tools and methods are available on Proxmark3 for public analysis and defense.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mifare-smart-cards/">Backdoor in MIFARE Smart Cards Reveals User-Defined Keys</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mifare-smart-cards/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hidden Backdoor in D-Link Routers Lets Attackers Log in as Admin</title>
		<link>https://firsthackersnews.com/backdoor-in-d-link-routers/</link>
					<comments>https://firsthackersnews.com/backdoor-in-d-link-routers/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 18 Jun 2024 00:04:32 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[D-Link Routers]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8081</guid>

					<description><![CDATA[<p>A critical vulnerability in several D-Link wireless router models allows unauthenticated attackers to gain administrative access. The CVE-2024-6045</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/backdoor-in-d-link-routers/">Hidden Backdoor in D-Link Routers Lets Attackers Log in as Admin</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical vulnerability in several D-Link wireless router models allows unauthenticated attackers to gain administrative access. The CVE-2024-6045 vulnerability has a high severity CVSS score of 8.8.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability in D-Link Routers </strong></h2>



<p>According to Twcert blogs, the vulnerability arises from an undisclosed factory testing backdoor in specific D-Link router models. Attackers on the local network can enable the Telnet service by accessing a specific URL. Additionally, by analyzing the firmware, attackers can obtain administrator credentials, giving them full control over the compromised router.</p>



<h2 class="wp-block-heading"><strong>Impacted Router Models</strong></h2>



<p>The following D-Link router models are affected by this vulnerability:</p>



<p>E15, E30, G403, G415, G416, M15, M18, M30, M32, M60, R03, R04, R12, R15, R18, R32.</p>



<p>Users of these router models are strongly advised to update their firmware to the latest version to mitigate the risk of exploitation. D-Link has released firmware updates to address this critical vulnerability. Here are the guidelines for updating router firmware:</p>



<ul class="wp-block-list">
<li>Models G403, G415, G416, M18, R03, R04, R12, R18: Update to firmware version 1.10.01 or later.</li>



<li>Models E30, M30, M32, M60, R32: Update to firmware version 1.10.02 or later.</li>



<li>Models E15, R15: Update to firmware version 1.20.01 or later.</li>
</ul>



<p>Users are urged to promptly apply these firmware updates to safeguard their routers from potential attacks.</p>



<p>Security researcher Raymond discovered and reported the vulnerability.</p>



<p>D-Link has acknowledged the issue and issued firmware updates to resolve the vulnerability.</p>



<p>As always, it is advisable to regularly check for and apply firmware updates to maintain the security of your network devices.</p>



<p>Stay vigilant and protect your routers from potential threats.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/backdoor-in-d-link-routers/">Hidden Backdoor in D-Link Routers Lets Attackers Log in as Admin</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/backdoor-in-d-link-routers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
