Tag: backdoor
-
The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
The United Kingdom government has secretly requested that Apple build a backdoor into its iCloud service, granting the government unrestricted access to users’ private data. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/13/uk-government-icloud-backdoor-request/
-
Neue Malware-Variante ‘TorNet” arbeitet mit gefälschten Überweisungsbestätigungen
Forscher von Cisco Talos warnen vor einer neuen Phishing-Kampagne, die auf Nutzer in Deutschland und Polen abzielt, um verschiedene Arten von Malware zu verbreiten, darunter eine neue Backdoor namens ‘TorNet”. Die Phishing-Mails geben vor, gefälschte Überweisungsbestätigungen von Finanzinstituten oder gefälschte Auftragsbestätigungen von Produktions- und Logistikunternehmen zu sein. ‘Die Phishing-E-Mails sind hauptsächlich in polnischer und deutscher…
-
The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
Researcher Jason Sinchak on Recent Cyber Warnings About Contec CMS8000 Devices. A hidden reverse backdoor in low-cost patient vital sign monitors used globally is hardcoded with an IP address connecting to a Chinese government-funded education and research network, which poses both privacy and potential safety concerns, said security researcher Jason Sinchak of ELTON. First seen…
-
Reported UK-ordered iCloud encryption backdoor slammed
First seen on scworld.com Jump to article: www.scworld.com/brief/reported-uk-ordered-icloud-encryption-backdoor-slammed
-
Privacy Roundup: Week 6 of Year 2025
Tags: access, ai, api, apple, backdoor, breach, browser, cctv, chrome, control, credit-card, cybersecurity, data, data-breach, encryption, exploit, firmware, framework, germany, government, group, leak, malware, monitoring, phishing, privacy, regulation, risk, router, scam, service, software, spy, technology, threat, tool, update, vpn, vulnerability, windowsThis is a news item roundup of privacy or privacy-related news items for 2 FEB 2025 – 8 FEB 2025. Information and summaries provided here are as-is for warranty purposes. Note: You may see some traditional “security” content mixed-in here due to the close relationship between online privacy and cybersecurity – many things may overlap;…
-
Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites.Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent First…
-
UK’s secret Apple iCloud backdoor order is a global emergency, say critics
Security experts say the ‘draconian’ order would have global ramifications that make this a privacy ’emergency for us all’ First seen on techcrunch.com Jump to article: techcrunch.com/2025/02/10/uks-secret-apple-icloud-backdoor-order-is-a-global-emergency-say-critics/
-
Hey, UK, Get Off of My Cloud
The United Kingdom has made a bold demand to Apple, purporting to require the company to create a backdoor to access encrypted cloud backups of all users worldwide. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/02/hey-uk-get-off-of-my-cloud/
-
UK Gov demands backdoor to access Apple iCloud backups worldwide
UK secretly demands Apple create an iCloud backdoor via a Technical Capability Notice, raising privacy concerns over end-to-end encryption. The UK demands Apple to create a backdoor to access any iCloud backups, the request raises concerns about user privacy and undermines Apple’s security commitments. >>The British government’s undisclosed order, issued last month, requires blanket capability…
-
Fake-Jobangebote für Software-Entwickler auf Linkedin
Aktive Kampagne mit Verbindungen zur nordkoreanischen Lazarus-Gruppe (APT 38). Infostealer für Krypto-Wallets als Payload einer vermeintlichen Projekt-Demo. Die Bitdefender Labs beobachten eine aktive Kampagne mit gefälschten Jobangeboten auf Linkedin. Im Rahmen des Bewerbungsverfahrens erhalten die Angreifer über einen Link bösartigen Code für eine Backdoor, einen Infostealer, einen Keylogger und einen Kryptominer. Linkedin ist nicht nur……
-
Threat Actors Exploit SimpleHelp Vulnerabilities to Deploy Sliver Backdoor
Cybersecurity firm Field Effect has identified and thwarted a sophisticated cyberattack that leveraged newly discovered vulnerabilities in SimpleHelp’s First seen on securityonline.info Jump to article: securityonline.info/threat-actors-exploit-simplehelp-vulnerabilities-to-deploy-sliver-backdoor/
-
Snoopers’ Charter: Großbritannien will Zugriff auf iCloud-Backups weltweit
Die britische Regierung verpflichtet Apple, eine Backdoor für verschlüsselte iCloud-Backups von Nutzern weltweit einzurichten. First seen on golem.de Jump to article: www.golem.de/news/snoopers-charter-grossbritannien-will-zugriff-auf-icloud-backups-weltweit-2502-193159.html
-
UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access
United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all encrypted content stored in its iCloud service. The demand, issued under the U.K.’s controversial Investigatory Powers Act of 2016, has raised alarm among privacy advocates and tech experts. If implemented, this order would allow British authorities to bypass encryption protections not…
-
Kimsuky shifts tactics from traditional backdoors to RDP, proxies
First seen on scworld.com Jump to article: www.scworld.com/news/kimsuky-shifts-tactics-from-traditional-backdoors-to-rdp-proxies
-
UK Home Office silent on alleged Apple backdoor order
Blighty’s latest stab at encryption? A secret order to pry open iCloud, sources claim First seen on theregister.com Jump to article: www.theregister.com/2025/02/07/home_office_apple_backdoor_order/
-
Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks
Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is transmitted by focusing on the meaning of data rather than raw content. Unlike traditional communication methods, these systems encode semantic features such as text, images, or speech into low-dimensional vectors, significantly reducing bandwidth usage while maintaining the integrity of transmitted information.…
-
Encryption Debate: Britain Reportedly Demands Apple Backdoor
Secret Order Seeks to Compel Apple to Weaken Encryption, Washington Post Reports. The British government has unexpectedly reignited the long-running encryption debate, reportedly issuing a secret order to Apple requiring that it provide direct access to global users’ fully encrypted cloud backups and prohibited the technology giant from alerting any targeted accountholders. First seen on…
-
UK government demands Apple backdoor to encrypted cloud data: report
Apple is likely to stop providing its encrypted cloud service to U.K. users First seen on techcrunch.com Jump to article: techcrunch.com/2025/02/07/uk-government-demands-apple-backdoor-to-encrypted-cloud-data-report/
-
Breach Roundup: Hacker Claims 20 Million OpenAI Logins Taken
Also: Researchers Bypass GitHub Copilot’s Protections, Deloitte Pays $5M for Breach. This week: A hacker claims to have 20 million OpenAI logins, Sweden clears ship in Baltic cable damage, researchers find ways to bypass GitHub Copilot’s protections, Netgear patches router flaws, undetectable Mac backdoor raises alarms, Spain nabs hacker, and Deloitte pays $5M for RIBridges…
-
Breach Roundup: Sweden Clears Ship in Baltic Cable Damage
Also: Researchers Bypass GitHub Copilot’s Protections, Deloitte Pays $5M for Breach. This week: Sweden clears ship in Baltic cable damage, researchers find ways to bypass GitHub Copilot’s protections, Netgear patches router flaws, undetectable Mac backdoor raises alarms, cyberattacks target aviation, Spain nabs international hacker, and Deloitte pays $5M for RIBridges breach. First seen on govinfosecurity.com…
-
Agencies Sound Alarm on Patient Monitors With Hardcoded Backdoor
CISA and the FDA are warning that Contec CMS8000 and Epsimed MN-120 patient monitors are open to meddling and data theft; Claroty Team82 flagged the vulnerability as an avoidable insecure design issue. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/agencies-sound-alarm-patient-monitors-hardcoded-backdoor
-
Hackers exploit SimpleHelp RMM flaws to deploy Sliver malware
Hackers are targeting vulnerable SimpleHelp RMM clients to create administrator accounts, drop backdoors, and potentially lay the groundwork for ransomware attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-exploit-simplehelp-rmm-flaws-to-deploy-sliver-malware/
-
SimpleHelp RMM flaws exploited to breach corporate networks
Hackers are targeting vulnerable SimpleHelp RMM clients to create administrator accounts, drop backdoors, and potentially lay the groundwork for ransomware attacks. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/simplehelp-rmm-flaws-exploited-to-breach-corporate-networks/
-
Malicious package found in the Go ecosystem
A malicious typosquat package has been found in the Go language ecosystem. The package, which contains a backdoor to enable remote code execution, was discovered by researchers at the application security company Socket.A February 3 Socket blog post states that the package impersonates the widely used Bolt database module. The BoltDB package is widely adopted in the Go ecosystem, with 8,367…
-
Lazarus Group tricks job seekers on LinkedIn with crypto-stealer
North Korea-linked Lazarus Group is duping job seekers and professionals in an ongoing campaign that runs a LinkedIn recruiting scam to capture browser credentials, steal crypto wallet data, and launch persistence.According to a discovery made by BitDefender Labs, threat actors reach out with fake LinkedIn job offers to lure the victims into downloading and executing…
-
Gefährliche Jobangebote für Software-Entwickler auf Linkedin
Die Bitdefender Labs beobachten eine aktive Kampagne mit gefälschten Jobangeboten auf LinkedIn. Im Rahmen des Bewerbungsverfahrens erhalten die Angreifer über einen Link bösartigen Code für eine Backdoor, einen Infostealer, einen Keylogger und einen Kryptominer. LinkedIn ist nicht nur eine Plattform zum Austausch und zur Suche nach Experten. Viele Cyberkriminelle nutzen zunehmend die Glaubwürdigkeit des Mediums…
-
Novel SSH backdoor leveraged in Chinese cyberespionage attacks
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-ssh-backdoor-leveraged-in-chinese-cyberespionage-attacks
-
Go Module Mirror served backdoor to devs for 3+ years
Supply chain attack targets developers using the Go programming language. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/02/backdoored-package-in-go-mirror-site-went-unnoticed-for-3-years/
-
MacOS Ferret operators add a deceptive bite to their malware family
The macOS Ferret family, variants of malware used by North Korean APTs for cyber espionage, has received a new member as samples of a detection-resistant variant, Flexible-Ferret, appear in the wild.The discovery of the samples was made by SentinelOne researchers who noted the variant’s capability to evade the recent XProtect signature update that Apple pushed…
-
Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms
150 abandoned Amazon S3 buckets could have been leveraged to deliver malware or backdoors to governments and Fortune companies. The post Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/abandoned-amazon-s3-buckets-enabled-attacks-against-governments-big-firms/

