#BackDoor

Puertas Percepciónpuertaspercepcion
2026-02-07

The is at times the most preferable. As always, keep an to new , and how to them.

A wooden gate to the backyard of a house, covered in lichen.
2026-02-05

Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework

Cisco Talos uncovered 'DKnife', a sophisticated gateway-monitoring and adversary-in-the-middle (AitM) framework comprising seven Linux-based implants. Used since 2019, DKnife performs deep-packet inspection, traffic manipulation, and malware delivery via routers and edge devices. It targets various devices, including PCs, mobile devices, and IoT, delivering ShadowPad and DarkNimbus backdoors. The framework primarily targets Chinese-speaking users, with evidence suggesting China-nexus threat actors as operators. DKnife's capabilities include DNS hijacking, Android application update hijacking, Windows binary hijacking, anti-virus traffic disruption, and user activity monitoring. A link to the WizardNet campaign was also discovered, indicating a shared development or operational lineage.

Pulse ID: 6984fa9b481e11f8426b9eb0
Pulse Link: otx.alienvault.com/pulse/6984f
Pulse Author: AlienVault
Created: 2026-02-05 20:16:27

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#AdversaryInTheMiddle #AitM #Android #BackDoor #China #Chinese #Cisco #CyberSecurity #DNS #Edge #InfoSec #IoT #Linux #Malware #Nim #OTX #OpenThreatExchange #RAT #ShadowPad #Talos #Windows #bot #AlienVault

Kevin Karhan :verified:kkarhan@infosec.space
2026-02-04

@Eichi es heißt #CensirBiit denn daran ist nix sicher, egal ob #BitLocker-#Backdoor oder #GoldenKeyBoot!

2026-02-04

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit

Chinese hackers used a previously undocumented custom backdoor to deliver shellcode to victims of a targeted espionage campaign, according to Rapid7 Labs and the Rapid 7 MDR team, who have uncovered a new type of malicious implant.

Pulse ID: 6983154d527ea2bf3aac3649
Pulse Link: otx.alienvault.com/pulse/69831
Pulse Author: CyberHunter_NL
Created: 2026-02-04 09:45:49

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Chinese #CyberSecurity #Espionage #InfoSec #OTX #OpenThreatExchange #Rapid7 #ShellCode #bot #CyberHunter_NL

2026-02-04

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit

Pulse ID: 6982cbe3f96a38f7a82972eb
Pulse Link: otx.alienvault.com/pulse/6982c
Pulse Author: Tr1sa111
Created: 2026-02-04 04:32:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #InfoSec #OTX #OpenThreatExchange #bot #Tr1sa111

DansLeRuSH ᴱᶰdanslerush@floss.social
2026-02-03

A (fairly technical) look at what happened with #NotepadPlusPlus and huge support to Don « The #Chrysalis #Backdoor : A Deep Dive into Lotus Blossom’s toolkit »

rapid7.com/blog/post/tr-chrysa

#InfoSec

2026-02-03

Leveraging of CVE-2026-21509 in Operation Neusploit

A new campaign dubbed Operation Neusploit, attributed to the Russia-linked APT28 group, targets Central and Eastern European countries using specially crafted Microsoft RTF files to exploit CVE-2026-21509. The attack chain involves multi-stage infection, delivering malicious backdoors including MiniDoor, PixyNetLoader, and a Covenant Grunt implant. The campaign employs social engineering lures in multiple languages, server-side evasion techniques, and abuses the Filen API for command-and-control communications. The malware components utilize various persistence mechanisms, steganography, and anti-analysis techniques. The operation showcases APT28's evolving tactics, techniques, and procedures in weaponizing the latest vulnerabilities.

Pulse ID: 698128e65e8a9984e3ff5b7e
Pulse Link: otx.alienvault.com/pulse/69812
Pulse Author: AlienVault
Created: 2026-02-02 22:44:54

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#APT28 #BackDoor #CyberSecurity #EasternEurope #Europe #ICS #InfoSec #Malware #Microsoft #OTX #OpenThreatExchange #RAT #RTF #Russia #SMS #SocialEngineering #Steganography #bot #AlienVault

2026-02-03

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom's toolkit

Rapid7 Labs has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom, involving a new custom backdoor named Chrysalis. The attack compromised Notepad++ infrastructure to deliver the backdoor. Analysis revealed multiple custom loaders, including one using Microsoft Warbird for obfuscation. The Chrysalis backdoor has extensive capabilities for information gathering, file operations, and remote command execution. Additional artifacts found include Cobalt Strike beacons and Metasploit payloads. The campaign shows Lotus Blossom evolving its tactics, mixing custom and off-the-shelf tools with advanced obfuscation techniques to evade detection.

Pulse ID: 6981aff0acbb318f992ed03e
Pulse Link: otx.alienvault.com/pulse/6981a
Pulse Author: AlienVault
Created: 2026-02-03 08:21:04

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Chinese #CobaltStrike #CyberSecurity #ELF #ICS #InfoSec #Microsoft #Notepad #OTX #OpenThreatExchange #RAT #Rapid7 #RemoteCommandExecution #bot #AlienVault

𝓜𝓪𝓻𝓬 𝓐𝓷𝓰𝓮𝓵𝓼bax3l33t
2026-01-29
Kevin Karhan :verified:kkarhan@infosec.space
2026-01-29

@tranquil_cassowary @halotroop2288 here's a good example:

criminaldefencelawyers.com.au/

And yes, this can and will be weaponized against any non-#Govware - #backdoored #OS & -Device.

In fact, #Australia banning #SecureDevices and -#Encryption came just after their #HoneyPot "#ANØM" aka. #OperationIronside aka. #OperationTrøjanShield had to end and they had to bust the users as #Estonia was unwilling to extend the permission to host the infrastructure on it's soil on behalf if #FBI & #AFP!

2026-01-28

APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP

A new campaign targeting Indian government entities was uncovered, utilizing three backdoors: SHEETCREEP, FIREPOWER, and MAILCREEP. These tools leverage legitimate cloud services like Google Sheets, Firebase, and Microsoft Graph API for command and control, enabling the attackers to blend in with normal traffic. The campaign, named Sheet Attack, employed PDFs and malicious LNK files as initial infection vectors. Evidence suggests the use of generative AI in malware development. While sharing similarities with APT36, the campaign's unique characteristics point to either a new Pakistan-linked group or an APT36 subgroup. The attackers demonstrated hands-on-keyboard activity and deployed additional payloads, including a document stealer, to selected targets.

Pulse ID: 697a42251f1b8af2c39201cc
Pulse Link: otx.alienvault.com/pulse/697a4
Pulse Author: AlienVault
Created: 2026-01-28 17:06:45

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #Cloud #CyberSecurity #Google #Government #ICS #India #InfoSec #LNK #Malware #Microsoft #OTX #OpenThreatExchange #PDF #Pakistan #RAT #bot #AlienVault

Kevin Karhan :verified:kkarhan@infosec.space
2026-01-28

@Soeren_loeg the fact that @signalapp not only does "#KYC with extra steps" by mandating a #PhoneNumber to this day as well as being solely under #CloudAct whilst basically being a #centralized, #proprietary, #SingleVendor & #SingleProvider solution makes them the ideal candidate for a longterm #HoneyPot like #ANØM aka. #OperationIronside aka. #OperationTrøjanShield.

Not to mention #Signal ticks way too many "#sus" boxes…

2026-01-27

CoolClient backdoor updated, new data stealing tools used

The HoneyMyte APT group has enhanced its toolset with an updated CoolClient backdoor and new data stealing capabilities. The group targeted government entities in Asia and Europe, particularly Southeast Asia. CoolClient now features clipboard monitoring, HTTP proxy credential sniffing, and plugin support for extended functionality. HoneyMyte also deployed browser login data stealers and document theft scripts. The campaign's focus has shifted towards active surveillance, including keylogging, clipboard data collection, and proxy credential harvesting. Organizations are advised to remain vigilant against HoneyMyte's evolving toolkit, which includes CoolClient, PlugX, ToneShell, Qreverse, and LuminousMoth malware families.

Pulse ID: 6978a64af51a4e50807b6636
Pulse Link: otx.alienvault.com/pulse/6978a
Pulse Author: AlienVault
Created: 2026-01-27 11:49:30

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Asia #BackDoor #Browser #Clipboard #CredentialHarvesting #CyberSecurity #Europe #Government #HTTP #InfoSec #Malware #OTX #OpenThreatExchange #PlugX #Proxy #bot #AlienVault

2026-01-27

A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups

PeckBirdy is a sophisticated JScript-based C&C framework employed by China-aligned APT groups since 2023. It exploits LOLBins across multiple environments to deliver advanced backdoors, targeting gambling industries and Asian government entities. The framework's versatility allows it to be used in various attack stages, from watering-hole control to lateral movement and C&C operations. Two campaigns, SHADOW-VOID-044 and SHADOW-EARTH-045, demonstrate coordinated threat group activity using PeckBirdy. The framework is complemented by two modular backdoors, HOLODONUT and MKDOOR, which extend its attack capabilities. PeckBirdy's design enables flexible deployment and execution across different environments, including browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET.

Pulse ID: 6977cf000e82fbf4ca307f21
Pulse Link: otx.alienvault.com/pulse/6977c
Pulse Author: AlienVault
Created: 2026-01-26 20:30:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Asia #BackDoor #Browser #CandC #China #CyberSecurity #Government #InfoSec #NET #OTX #OpenThreatExchange #RAT #bot #AlienVault

2026-01-27

APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1

A Pakistan-linked APT group conducted two campaigns targeting Indian government entities. The Gopher Strike campaign used PDFs with malicious links to deliver an ISO file containing GOGITTER, a Golang downloader that fetches payloads from private GitHub repositories. GITSHELLPAD, a Golang backdoor, was used for C2 communication via GitHub. GOSHELL, a Golang shellcode loader, deployed Cobalt Strike Beacon on specific hostnames. The attackers used various techniques including scheduled tasks for persistence, obfuscation, and environmental keying. Post-compromise activities involved system reconnaissance and data exfiltration. The campaign demonstrated sophisticated TTPs and custom-built tools, indicating a potentially new subgroup or parallel Pakistan-linked threat actor.

Pulse ID: 6977da59fb7a0679c7535c14
Pulse Link: otx.alienvault.com/pulse/6977d
Pulse Author: AlienVault
Created: 2026-01-26 21:19:21

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CobaltStrike #CyberSecurity #GitHub #Golang #Government #India #InfoSec #OTX #OpenThreatExchange #PDF #Pakistan #RAT #ShellCode #bot #AlienVault

2026-01-26

North Korean cybercriminals are using an AI-generated PowerShell backdoor

North Korean cybercriminals are targeting developers with access to blockchains. A PowerShell backdoor appears to be programmed by AI.

heise.de/en/news/North-Korean-

#Backdoor #Cybercrime #IT #KünstlicheIntelligenz #Malware #PowerShell #Security #news

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst