Attackers deploy Linux backdoor on e-stores compromised with software skimmer | Cybersecurity News

Votre vidéo commence dans 10
Passer (5)
Formation gratuite en FR pour les membres inscrits sur les sites de vidéos

Merci ! Partagez avec vos amis !

Vous avez aimé cette vidéo, merci de votre vote !

Ajoutées by admin
79 Vues
During an analysis into the infiltration of an e-commerce platform with malware skimming, cybersecurity experts from the Sansec Threat Research Group uncovered a Linux backchannel.
The hackers started by exploring the e-store with robotic eCommerce assault queries as part of their reconnaissance stage. The malicious hackers identified and attacked a document uploading weakness in one of the e-plugins company's following a day and a half, uploading a webshell and injecting a software grabber.
According to Golang, the hackers also released linu_avp (Linux backdoor) that undercover as an unoriginal ps-off procedure. The trojan may accept instructions from an Alibaba-hosted site, according to the research (47.113.202.35). To ensure permanence, the trojan adds a fraudulent crontab item.
The backdoor was supposedly created by user "dob" in some kind of a project folder called "lin AVP," and that it was designated GREECE by the design team. A month after it had been originally uploaded here on-site, Backdoor had a 0% detection performance on VirusTotal's anti-malware engines.
#linux #hacker #hacking #cybersecurity #news
Catégories
E commerce Divers

Ajouter un commentaire

Connectez-vous ou inscrivez-vous pour poster un commentaire.

Commentaires

Soyez le premier à commenter cette vidéo.