backdoor

Amazon CEO Andy Jassy denies RTO is a 'backdoor' plan for layoffs

The Amazon CEO reportedly told employees at an all-hands meeting that the company's five-day-a-week policy was aimed at improving company culture.




backdoor

SE Radio 630: Luis Rodríguez on the SSH Backdoor Attack

Luis Rodríguez, CTO of Xygeni.io, joins host Robert Blumen for a discussion of the recently thwarted attempt to insert a backdoor in the SSH (Secure Shell) daemon. OpenSSH is a popular implementation of the protocol used in major Linux distributions for authentication over a network. Luis describes how a backdoor in a supporting library was recently discovered and removed before the package was published to stable releases of the Linux distros. The conversation explores the mechanism of the attack through modifying a function table in the runtime; how the attack was inserted during the build; how the attack was carefully staged in a series of modifications to the lz compression library; the nature of “Jia Tan,” the entity who committed the changes to the open source project; social engineering that the entity used to gain the trust of the open source community; what forensics indicates about the location of the entity; hypotheses about whether criminal or state actors backed the entity; how the attack was detected; implications for other open source projects; why traditional methods for detecting exploits would not have helped find this; and lessons learned by the community.

Brought to you by IEEE Computer Society and IEEE Software magazine.




backdoor

Backdoor in XZ Utils That Almost Happened

The xz Utils backdoor incident reveals that the security of the global internet depends on countless obscure pieces of software written and maintained by even more obscure unpaid, distractible, and sometimes vulnerable volunteers. It’s an untenable situation, and one that is being exploited by malicious actors. Yet precious little is being done to remedy it.




backdoor

Backdoor.Win32.DEVILSHADOW.THEAABO

Threat type: Backdoor

Aliases: Trojan.Win32.Scar.sydj (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




backdoor

Backdoor.MSIL.BLADABINDI.THA

Threat type: Backdoor

Aliases: Backdoor:MSIL/Bladabindi.SBR!MSR (Microsoft), MSIL:Bladabindi-JK [Trj](AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

Cybercriminals used this malware bundled with legitimate installation copies of the VPN software known as Windscribe. Note that these copies are hosted from fraudulent sources.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

It gathers certain information on the affected computer. It logs a user's keystrokes to steal information.




backdoor

Backdoor.MSIL.SUNBURST.A

Threat type: Backdoor

Aliases: Trojan:MSIL/Solorigate.B!dha (Microsoft); Trj/Solorigate.A (Panda)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.




backdoor

Check backdoor appointments to govt. vacancies: Chennithala




backdoor

Amazon CEO denies full in-office mandate is 'backdoor layoff'

Amazon CEO Andy Jassy said at an all-hands meeting on Tuesday that the plan to require employees to be in-office five days per week is not meant to force attrition





backdoor

Linux Kernel Backdoor Blocked















backdoor

Telnet Backdoor Opens More Than 1M IoT Radios To Hijack









backdoor

NICE Recording eXpress 6.x Root Backdoor / XSS / Bypass

NICE Recording eXpress versions 6.0.x, 6.1.x, 6.2.x, 6.3.x, and 6.5.x suffer from cross site scripting, root backdoor, unauthenticated access, fail authorization, insecure cookie handling, and remote SQL injection vulnerabilities.




backdoor

Webmin 1.920 password_change.cgi Backdoor

This Metasploit module exploits a backdoor in Webmin versions 1.890 through 1.920. Only the SourceForge downloads were backdoored, but they are listed as official downloads on the project's site. Unknown attacker(s) inserted Perl qx statements into the build server's source code on two separate occasions: once in April 2018, introducing the backdoor in the 1.890 release, and in July 2018, reintroducing the backdoor in releases 1.900 through 1.920. Only version 1.890 is exploitable in the default install. Later affected versions require the expired password changing feature to be enabled.







backdoor

Netis E1+ 1.2.32533 Hardcoded Backdoor Account

Netis E1+ version 1.2.32533 suffers from having a hardcoded backdoor root account.






backdoor

openssh-3.6.1p2-backdoor.patch.gz

OpenSSH 3.6.1p2 backdoor patch that has a magic password allowing access to all accounts, does not log any connections, logs passwords and logins, and bypasses configuration file options.




backdoor

openssh_backdoor.patch.txt

OpenSSH patch tested with versions 4.2p1 and 4.7p1 that allows for a hidden user to login with root permissions.




backdoor

Bash Root Shell Backdoor

This patch is a backdoor to bash that will create a setuid backdoor shell in /tmp if run as root.




backdoor

OpenSSH 6.0p1 Full Backdoor Patch

This patch for OpenSSH 6.0 Portable adds a hardcoded skeleton key, removes connection traces in the log files, usernames and passwords both in and out are logged, and more.




backdoor

Meterpreter Swaparoo Windows Backdoor Method

Swaparoo - Windows backdoor method for Windows Vista/7/8. This code sneaks a backdoor command shell in place of Sticky Keys prompt or Utilman assistant at login screen.









backdoor

Tightening the Rules of Backdoor Listings

In recent years, there have been growing concerns over backdoor listings and shell activities in Hong Kong as a result of which new businesses have been able to be listed without going through the listing requirements contained in the Rules Gover...




backdoor

The backdoor threat to encryption


This post originally appeared in the opinion page of the Boston Globe on October 1, 2015.

As they ratchet up a campaign for backdoor access to information on iPhones and other devices with encryption, some law enforcement leaders paint a dark vision of technology. Manhattan DA Cyrus Vance suggests that passcodes on smartphones blocked identification of a murderer. British Prime Minister David Cameron sees a “safe haven” for terrorists “in dark places.” FBI Director James Comey alludes to phones buzzing devilish messages in the pockets of ISIS recruits and says widespread encryption “threatens to lead us to a very, very dark place.”

Sure, it’s the job of law enforcement officers to look on the dark side, and to focus on protecting people and catching criminals. But evil lies with terrorists and criminals — not the phones or apps they use. Cellphones are targets simply because they have become such rich new sources of evidence for law enforcement. Chief Justice John Roberts called them windows into our entire lives.

Comey acknowledges the benefits of strong encryption may outweigh the costs, but says “part of my job is make sure the debate is informed by a reasonable understanding of the costs.” Part of my job at the Commerce Department a few years ago was to make sure government debate on security and law enforcement issues was informed by a reasonable understanding of costs to security and privacy, innovation, economic growth, and democratic values in the world.

With backdoors, these costs are real. Leading cryptologists have detailed how backdoors would create “grave security risks.” Comey has suggested to Congress that tech companies can solve this problem if only they spend enough time on it. Yet no amount of magical thinking can undo the contradiction between promoting strong encryption as a defense against the barrage of identity theft, espionage, and other cybercrimes while opening up new vulnerabilities.

There is an acute need to strengthen data security everywhere, and no realistic way to leave a door open for good guys and democracies that have rigorous checks and balances but not for cybercriminals or authoritarian states.

Backdoors undermine not only security, but also the competitive position of US companies that are trying to strengthen global trust in their brands and correct perceptions of “direct access” for US intelligence and law enforcement left by the Snowden leaks.

If backdoors are adopted for US products, people intent on keeping information secure, whether for benign or nefarious reasons, will turn to alternatives like cheap burner phones, devices sold in other countries, and encryption applications.

The United States would face a choice of whether to join the ranks of countries that try to block devices and services. That dilemma shows another important cost of backdoors — they undermine America’s position in the world.

The United States has promoted technologies that help democratic activists avoid surveillance by repressive governments, objected to measures in India and China that imply backdoors or block imports of encrypted devices like Blackberries, and taken unprecedented steps to provide transparency and limits on foreign intelligence collection. If the United States adopts backdoor requirements, though, no matter how constrained by checks and balances, it will face cries of hypocrisy.

In the backdrop of President Obama’s discussions with Chinese President Xi Jinping about cybersecurity are concerns about Chinese measures that require “secure and controllable” information technology and assert “Internet sovereignty.” It is hard to picture our president making headway on such concerns if his own government is contemplating backdoors.

In the end, the president himself likely will have to decide where his administration comes out on backdoors. When he does, he will have to pick sides.

The choices are less stark than the law enforcement meme “going dark” implies. Even so, it may be, as Chief Justice Roberts has written, that “Cellphones have become important tools in facilitating coordination and communication among members of criminal enterprises” but “Privacy comes at a cost.” So do security and trust.

The time has come for the president to shut the door on backdoors and send a clear message to the world that American technology is a trusted instrument of freedom.

Image Source: © Albert Gea / Reuters
      
 
 




backdoor

Backdoor.Perl.SHELLBOT.AB

Over All Risk Rating : Low


This backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.

This Backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.

Read More




backdoor

Backdoor.Linux.MIRAI.VWIQT

Over All Risk Rating : Low


IoT malware uses two different encryption routines for its strings and modified the magic number of UPX.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

Read More




backdoor

Backdoor.Perl.SHELLBOT.D

Over All Risk Rating : Low


This backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

Read More