Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Expired domains allowed control of more than 4,000 backdoors in compromised systems
Global Security

Expired domains allowed control of more than 4,000 backdoors in compromised systems

AdminBy AdminJanuary 13, 2025No Comments3 Mins Read
Expired Domains
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 13, 2025Ravi LakshmananMalware / Domain Security

Domains have expired

At least 4,000 unique web backdoors previously deployed by various threat actors were captured by taking control of abandoned and outdated infrastructure for as little as $20 per domain.

Cybersecurity company watchTowr Labs said it completed the operation, registering more than 40 domain names that the backdoors were designed to use for command and control purposes (C2). In partnership with the Shadowserver Foundation, the domains involved in the study were processed.

“We hijacked backdoors (that depended on now-abandoned infrastructure and/or expired domains) that existed inside backdoors themselves, and have watched the results flow ever since,” watchTowr Labs CEO Benjamin Harris and researcher Alize Hammond said in the technical description last week.

Cyber ​​security

“This capture allowed us to track compromised hosts as they ‘reported’ and in theory gave us command and control over those compromised hosts.”

Compromised entities identified by the beacon include government entities from Bangladesh, China, and Nigeria; and academic institutions in China, South Korea, and Thailand, among others.

Backdoors, which are nothing more than web shells designed to provide permanent remote access to target networks for later use, vary in scope and functionality –

  • Simple web shells that are able to execute an attacker’s command using PHP code
  • c99shell
  • r57shell
  • China Chopperweb shell known by China-nexus advanced persistent threat groups (APT).

Both c99shell and r57shell are full-featured web shells with the ability to execute arbitrary code or commands, perform file operations, deploy additional payloads, brute force FTP servers, and remove themselves from compromised nodes.

WatchTowr Labs said it has seen cases where script developers backdoored some of the web shells to leak the locations where they were deployed, thereby inadvertently handing control over to other threat actors.

Cyber ​​security

The development appears a couple of months after the campaign revealed he spent just $20 to acquire an obsolete WHOIS server domain (“whois.dotmobiregistry(.)net”) associated with the .mobi top-level domain (TLD), identifying more than 135,000 unique systems that even communicated with the server after , as it was moved to “whois.nic(.)mobi.”

These included various private companies, such as VirusTotal, as well as mail servers for countless government, military, and university organizations. The .gov addresses belonged to Argentina, Bangladesh, Bhutan, Ethiopia, India, Indonesia, Israel, Pakistan, the Philippines, Ukraine, and the United States

“It’s somewhat encouraging to see attackers making the same mistakes as defenders,” watchTowr Labs said. “It’s easy to think that attackers are never wrong, but we’ve seen evidence of the opposite — boxes with open web shells, expired domains, and the use of software that was backdoored.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.