Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Expired domains allowed control of more than 4,000 backdoors in compromised systems
Global Security

Expired domains allowed control of more than 4,000 backdoors in compromised systems

AdminBy AdminJanuary 13, 2025No Comments3 Mins Read
Expired Domains
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 13, 2025Ravi LakshmananMalware / Domain Security

Domains have expired

At least 4,000 unique web backdoors previously deployed by various threat actors were captured by taking control of abandoned and outdated infrastructure for as little as $20 per domain.

Cybersecurity company watchTowr Labs said it completed the operation, registering more than 40 domain names that the backdoors were designed to use for command and control purposes (C2). In partnership with the Shadowserver Foundation, the domains involved in the study were processed.

“We hijacked backdoors (that depended on now-abandoned infrastructure and/or expired domains) that existed inside backdoors themselves, and have watched the results flow ever since,” watchTowr Labs CEO Benjamin Harris and researcher Alize Hammond said in the technical description last week.

Cyber ​​security

“This capture allowed us to track compromised hosts as they ‘reported’ and in theory gave us command and control over those compromised hosts.”

Compromised entities identified by the beacon include government entities from Bangladesh, China, and Nigeria; and academic institutions in China, South Korea, and Thailand, among others.

Backdoors, which are nothing more than web shells designed to provide permanent remote access to target networks for later use, vary in scope and functionality –

  • Simple web shells that are able to execute an attacker’s command using PHP code
  • c99shell
  • r57shell
  • China Chopperweb shell known by China-nexus advanced persistent threat groups (APT).

Both c99shell and r57shell are full-featured web shells with the ability to execute arbitrary code or commands, perform file operations, deploy additional payloads, brute force FTP servers, and remove themselves from compromised nodes.

WatchTowr Labs said it has seen cases where script developers backdoored some of the web shells to leak the locations where they were deployed, thereby inadvertently handing control over to other threat actors.

Cyber ​​security

The development appears a couple of months after the campaign revealed he spent just $20 to acquire an obsolete WHOIS server domain (“whois.dotmobiregistry(.)net”) associated with the .mobi top-level domain (TLD), identifying more than 135,000 unique systems that even communicated with the server after , as it was moved to “whois.nic(.)mobi.”

These included various private companies, such as VirusTotal, as well as mail servers for countless government, military, and university organizations. The .gov addresses belonged to Argentina, Bangladesh, Bhutan, Ethiopia, India, Indonesia, Israel, Pakistan, the Philippines, Ukraine, and the United States

“It’s somewhat encouraging to see attackers making the same mistakes as defenders,” watchTowr Labs said. “It’s easy to think that attackers are never wrong, but we’ve seen evidence of the opposite — boxes with open web shells, expired domains, and the use of software that was backdoored.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025

Mirror aims Japan and Taiwan with Roysingmouse and upgraded malicious program

May 8, 2025

Only security tools do not protect you – control efficiency makes

May 8, 2025

Russian hackers using Flackfix Fake CAPTCHA to deploy new malware LostKeys

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.