HackDig : Dig high-quality web security articles for hacker

Twittor – Backdoor Using Twitter For Command & Control

Twittor is a stealthy Python based backdoor using Twitter (Direct Messages) as a command and control server. This project has been inspired by Gcat which does the same but using a Gmail account.SetupFor this to work you need:A Twitter account (Use a dedicated account! Do not use your personal one!)Register an app on Twitter with Read, write, and direct messa
Publish At:2015-10-09 13:05 | Read:2588 | Comments:0 | Tags:Hacking Tools Programming backdoor command and control Pytho

Gcat – Python Backdoor Using Gmail For Command & Control

Gcat is a stealthy Python backdoor that uses Gmail as a command and control server. It’s fairly basic right now, but it’s an interesting proof of concept and if the community got behind it and contributed some new features it could be a pretty powerful piece of kit.Feature wise it doesn’t have that much, you can’t upload files yet, bu
Publish At:2015-09-12 04:15 | Read:3604 | Comments:0 | Tags:Hacking Tools Programming backdoor command and control gcat

Cryptowall 3.0 Slims Down, Removes Exploits From Dropper

A slimmed down version of Cryptowall is in circulation, and this one contains no built-in exploits, confirming a growing trend that most ransomware will be spread almost exclusively via exploit kits.Kits such as Angler, Nuclear, and most recently Hanjuan, have been busy incorporating Flash exploits dropping a mix of click-fraud malware and ransomware with gr
Publish At:2015-02-09 17:20 | Read:3233 | Comments:0 | Tags:Uncategorized Cisco Cisco Talos command and control Cryptowa

Matsnu Botnet DGA Discovers Power of Words

Domain generation algorithms have been botmasters’ favorite tool for keeping malware up and running—and for frustrating security researchers and detection technologies.Like malware, DGAs evolve, thus complicating an already tricky cat-and-mouse game between criminals and white hats.Related PostsRovnix Variant Surfaces With New DGAOctober 9, 2014 , 2:17
Publish At:2014-11-18 11:45 | Read:2581 | Comments:0 | Tags:Malware Web Security Aviv Raff backdoor Bayrob Botnets comma

Security Slice: Command and Control Evolution

Shape Security recently found a new strain of malware that executes a unique command and control attack. While these attacks are common, this one hides in unsent Gmail drafts, making it surprisingly difficult to detect.Will similar command and control evasion techniques target other unassuming programs?Listen to our latest security slice podcast and hear Tim
Publish At:2014-11-10 13:35 | Read:2745 | Comments:0 | Tags:Security Slice Command and Control Gmail malware Podcast

How bots and zombies work, and why you should care

We regularly write about "bots", or "zombies," malicious programs that let cybercriminals take over your computer from afar.Some malware is pre-programmed for one specific criminal act, such as ransomware that scrambles your data and demands a fee to get it back.But most bots or zombies are kitted out with a wide range of "features." Any of these can be cont
Publish At:2014-10-31 16:40 | Read:3028 | Comments:0 | Tags:Botnet Featured Malware botmaster botnet CnC command and con

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud