Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and RootkitsUNC3886 is targeting end-of-life Juniper MX routers to deploy custom backdoors, showcasing advanced cyber espionage techniques.
Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker AccessOver 1,000 WordPress websites infected with multiple backdoors via malicious JavaScript.Attackers are leveraging these backdoors for persistent access and control.
Crims backdoored their backdoors. Then the domains lapsedAbandoned domains and infrastructure pose significant security risks, facilitating mass-hacking practices by criminals.
EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK FilesRussian government and IT organizations targeted by EastWind spear-phishing campaign with backdoors and trojans like GrewApacha, CloudSorcerer, and PlugY.
Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker AccessOver 1,000 WordPress websites infected with multiple backdoors via malicious JavaScript.Attackers are leveraging these backdoors for persistent access and control.
Crims backdoored their backdoors. Then the domains lapsedAbandoned domains and infrastructure pose significant security risks, facilitating mass-hacking practices by criminals.
EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK FilesRussian government and IT organizations targeted by EastWind spear-phishing campaign with backdoors and trojans like GrewApacha, CloudSorcerer, and PlugY.
Apple appeals UK encryption backdoor demandApple's appeal seeks to prevent encryption backdoors and discourage other governments from similar demands.