Tag
#backdoor
The bin-collection package in PyPI before v0.1 included a code execution backdoor inserted by a third party.
The scu-captcha package in PyPI v0.0.1 to v0.0.4 included a code execution backdoor inserted by a third party.
The eziod package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.
The PyCrowdTangle package in PyPI before v0.0.1 included a code execution backdoor inserted by a third party.
The wikifaces package in PyPI v1.0 included a code execution backdoor inserted by a third party.
OctoBot WebInterface version 0.4.3 suffers from a remote code execution vulnerability.
The CloudMensis spyware, which can lift reams of sensitive information from Apple machines, is the first Mac malware observed to exclusively rely on cloud storage for C2 activities.
The cyber campaign, aimed at siphoning funds, uses an improved version of the malware, which can adjust infection paths based on recognized antivirus software.
The advanced persistent threat (APT) actor tracked as Evilnum is once again exhibiting signs of renewed activity aimed at European financial and investment entities. "Evilnum is a backdoor that can be used for data theft or to load additional payloads," enterprise security firm Proofpoint said in a report shared with The Hacker News. "The malware includes multiple interesting components to evade
A large software development company whose software is used by different state entities in Ukraine was at the receiving end of an "uncommon" piece of malware, new research has found. The malware, first observed on the morning of May 19, 2022, is a custom variant of the open source backdoor known as GoMet and is designed for maintaining persistent access to the network. "This access could be