In a post published Wednesday, watchTowr Labs CEO Benjamin Harris and researcher Aliz Hammond said they have successfully identified entry points into thousands of live backdoors being used by hackers through the interconnected infrastructure they leave behind. (Image Source: Getty Images)
Researchers at watchTowr Labs found that abandoned and expired internet infrastructure left by hacking groups can function as backdoors within other backdoors.
Mourners pay tributes at a makeshift memorial for the victims of the deadly Halloween crowd surge, outside a subway station in the district of Itaewon in Seoul on November 1, 2022. (Photo by JUNG YEON-JE/AFP via Getty Images)
The group used six backdoors against more than a dozen industrial plants, research institutes and government agencies, according to Kaspersky.
Aug 8, 2022
Gen. Paul Nakasone, Cyber Command’s commander, at a Senate Armed Services Committee hearing on March 25, 2021. (Photo by Andrew Harnik-Pool/Getty Images)
A Chinese bank required a company to use a specific kind of tax software for local tax purposes, but the software deployed a backdoor, Trustwave researchers say.