backdoor

Pierluigi Paganini October 13, 2013
A backdoor present in many D-Link devices allows to bypass authentication

Researcher Craig published an interesting blog post on “/dev/ttyS0” on the reverse engineering of the backdoor present in many D-Link devices. Today I decided to propose an interesting backdoor analysis published on the blog “/dev/ttyS0” specialized on the embedded device hacking. The researcher Craig demonstrated the presence of a backdoor within some DLink routers that allows an attacker to […]

Pierluigi Paganini September 20, 2013
An undetectable Hardware Trojan is reality

A team of researchers developed an hardware trojan undetectable to most detection techniques raising the question on need of proper hardware qualification. A Team of researchers conducted a study on a stealthy Dopant-Level Hardware Trojans, an insidious menace that could have a dramatic impact on production processed of chips in every sector. The team composed […]

Pierluigi Paganini September 19, 2013
NSA tried to insert backdoor into Linux

Linux Torvalds during last LinixCon admitted to have received pressure from US Intelligence to insert a backdoor into Linux. Linux Torvalds during a question-and-answer â€Șsession ‬at â€Șthe LinuxCon publicly admitted that the US Government requested him to insert a backdoor into Linux kernel. The circumstance must induce a reflection in all those experts that believe open […]

Pierluigi Paganini August 09, 2013
Fort Disco botnet compromised more than 6000 websites

Researchers at Arbor Networks discovered a botnet called Fort Disco that was used to compromise more than 6000 websites based on popular CMSs. A botnet called Fort Disco was used to compromised more than 6000 websites based on  popular content management systems such as Joomla, WordPress and Datalife Engine. The Fort Disco botnet is currently made […]

Pierluigi Paganini July 29, 2013
Spy agencies ban on Lenovo PCs due to backdoor vulnerabilities

Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities that could allow an attacker to remotely access to the computers. Spy agencies reportedly have a long-standing ban on Lenovo PCs due to backdoor vulnerabilities. Lenovo PC banned by spy agencies in the UK, Australia and the US due the possible impairment […]

Pierluigi Paganini July 17, 2013
Trend Micro – targeted attack against Europe-Asia government agencies

Trend Micro uncovered targeted attack against European and Asian government agencies to steal login credentials from IE and Microsoft Outlook products. A new targeted attack has been uncovered by Trend Micro security experts, the hackers hit European government agencies trying to steal login credentials from Internet Explorer (IE) and Microsoft Outlook. The attackers trying to […]

Pierluigi Paganini July 12, 2013
HP warns on presence of backdoor in storage devices

HP publicly admitted the presence of backdoor in its StoreVirtual storage products designed to respond to the needs of virtualized environments. HP publicly admitted the presence of backdoor in its storage products, in particular the company revealed the presence of an undocumented administrative account in the product family StoreVirtual designed to respond to the needs of virtualized […]

Pierluigi Paganini June 16, 2013
RARSTONE, TrendMicro revealed Naikon cyberespionage campaign

RARSTONE is the name of the RAT (REMOTE ACCESS TOOL) used in a cyber espionage campaign dubbed “Naikon” uncovered by security experts at TrendMicro. Security experts at TrendMicro revealed to have detected the RARSTONE RAT studying targeted attacks across Asia (e.g. India, Malaysia, Singapore, and Vietnam) conducted against various companies belonging to different sectors such […]

Pierluigi Paganini May 13, 2013
The offensive approach to cybersecurity, motivations and risks

Cybersecurity goes to the offensive, law enforcement and private companies are discussing the possibility to adopt an offensive approach to defend their assets from the continuous cyber attacks. The press is getting used to news of cyber attacks against companies and government agencies, to date, the trend of the representatives of the cybersecurity of these entities […]

Pierluigi Paganini May 12, 2013
Apple decrypts seized iPhones for law enforcement

Apple can “bypass the security software” if it chooses, accoring ATF no law enforcement agency could unlock a defendant’s iPhone except Apple that has created a police waiting list because of high demand. Apple is considered an impregnable fortress, the main functions provided by the iOS operating system and related data are inaccessible to ill-intentioned but […]