Security Hero Rotating Header Image

Posts Tagged ‘Backdoor’

Asante FM2008 10/100 Ethernet switch backdoor login

Bugtraq: Re: Asante FM2008 10/100 Ethernet switch backdoor login Re: Asante FM2008 10/100 Ethernet switch backdoor login URL: http://www.securityfocus.com/archive/1/505230

increased Backdoor.Coreflood infections

increased Backdoor.Coreflood infections Posted by auto319326_at_hushmail.com on May 29 Is anyone else seeing an increasing in Backdoor.Coreflood infections on their network? I have not yet been able to pinpoint the infection vector. Has anyone seen coreflood being dropped by a specific set of web pages? Cheers, Tim URL: http://seclists.org/incidents/2009/May/0001.html

A lesson in FUD

Mydoom: A lesson in FUD Fear, uncertainty and doubt can have very real effects on security, especially when uninformed ‘experts’ are too quick to jump to conclusions. Mydoom was an example. In the last week of January 2004, a new worm was discovered squirming its way across the Internet. Security researchers quickly realized this was [...]

Backdoor in com_rsgallery2 gallery extension for joomla

Bugtraq: Backdoor in com_rsgallery2 gallery extension for joomla Backdoor in com_rsgallery2 gallery extension for joomla URL: http://www.securityfocus.com/archive/1/503824

Backdoor in com_rsgallery2 gallery extension for joomla

Backdoor in com_rsgallery2 gallery extension for joomla <!– Envelope-to: email@address Delivery-date: Tue, 26 May 2009 16:58:59 +0100 Received: from outgoing.securityfocus.com ([205.206.231.26] helo=outgoing2.securityfocus.com) by lt.network5.net with esmtp (Exim 4.43) id 1M8z3L-0002Ld-Ef for email@address; Tue, 26 May 2009 16:58:59 +0100 Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20]) by outgoing2.securityfocus.com (Postfix) with QMQP id 0676F143742; Tue, 26 May 2009 09:55:15 [...]

Hackers use PDFs to take over PCs

Hackers use PDFs to take over PCs Want to be more secure online? Stop using Adobe Acrobat reader to open PDF documents in your browser. That’s what F-Secure virus hunter Mikko Hypponen, the closest thing to a rock star holding court at the RSA security conference, is advocating. Ditching Adobe Acrobat Reader will greatly reduce [...]

.NET Framework Rootkits

.NET Framework Rootkits Posted by Erez Metula on Apr 7 Hello, Attached are the presentation + whitepaper I’m going to talk about at BlackHat conference next week in Amsterdam, titled ".NET Framework Rootkits – Backdoors inside Your Framework". The main threats of Framework level rootkits are  * Hidden malware  *… URL: http://seclists.org/fulldisclosure/2009/Apr/0062.html

Backdoor:WinNT/Rustock.E

Backdoor:WinNT/Rustock.E URL: http://www.threatexpert.com/report.aspx?md5=45fe4ece57819a9f33797d84c216f08e

Backdoor.Win32.Omega.a

Backdoor.Win32.Omega.a URL: http://www.threatexpert.com/report.aspx?md5=7dfe5309bd64643fe88006ae48c01b4a

Backdoor.Bifrose, Trojan-Dropper.Win32.Agent.fdl, Virus.Win32.Bifrose

Backdoor.Bifrose, Trojan-Dropper.Win32.Agent.fdl, Virus.Win32.Bifrose URL: http://www.threatexpert.com/report.aspx?md5=e1af8da76e6c2ee16312a06935e61d8f

Backdoor:Win32/Bifrose.EY, VirTool.Win32.CeeInject, Win-Trojan/Bifrose.48559..

Backdoor:Win32/Bifrose.EY, VirTool.Win32.CeeInject, Win-Trojan/Bifrose.48559.. URL: http://www.threatexpert.com/report.aspx?md5=855c3213639a19dd30bf9297e866a47b

Backdoor.Win32.Bifrose.aqws, VirTool:Win32/Vbinder.P, VirTool.Win32.Vbinder..

Backdoor.Win32.Bifrose.aqws, VirTool:Win32/Vbinder.P, VirTool.Win32.Vbinder.. URL: http://www.threatexpert.com/report.aspx?md5=1ecb7c9e122b7df7420f93fd2a568162

Trojan.Win32.FlyStudio.hr, Backdoor.Win32.FlyAgent

Trojan.Win32.FlyStudio.hr, Backdoor.Win32.FlyAgent URL: http://www.threatexpert.com/report.aspx?md5=f0e6d57fccc99ca2c029b1c3023bed3a

Trojan.Win32.Agent.buuk, Trojan-Dropper, Worm.Pinit, Backdoor.Agent!sd6..

Trojan.Win32.Agent.buuk, Trojan-Dropper, Worm.Pinit, Backdoor.Agent!sd6.. URL: http://www.threatexpert.com/report.aspx?md5=dd48b71a112600d5de276f8d7c0cfb44

Trojan-Dropper.Vb, Backdoor.ProRAT.K, Trojan.TDss, Packed.Generic.202..

Trojan-Dropper.Vb, Backdoor.ProRAT.K, Trojan.TDss, Packed.Generic.202.. URL: http://www.threatexpert.com/report.aspx?md5=7fa61f8b1ed99c1699c431790b990d36

Bad Behavior has blocked 194 access attempts in the last 7 days.