XZ backdoor behavior inside OpenSSHIn this article, we analyze XZ backdoor behavior inside OpenSSH, after it has achieved RSA-related function hook.#securelist#EN#2024#Backdoor#Cyber-espionage#Linux#Malware#Malware-Descriptions#Malware-Technologies#SSH#Targeted-attacks#XZ·securelist.com·Jun 24, 2024XZ backdoor behavior inside OpenSSH
Kaspersky analysis of the backdoor in XZKaspersky analysis of the backdoor recently found in XZ, which is used in many popular Linux distributions and in OpenSSH server process.#securelist#EN#2024#Backdoor#Cyber-espionage#Linux#Malware#analysis#Malware-Descriptions#Malware-Technologies#SSH#XZ·securelist.com·Apr 13, 2024Kaspersky analysis of the backdoor in XZ
A backdoor with a cryptowallet stealer inside cracked macOS softwareWe review a new macOS backdoor that piggybacks on cracked software to replace Bitcoin and Exodus wallets with malware.#securelist#EN#2024#Apple#MacOS#Backdoor#Cryptocurrencies#DNS#Malware#Malware-Descriptions#Malware-Technologies#Trojan#Trojan-stealer·securelist.com·Jan 22, 2024A backdoor with a cryptowallet stealer inside cracked macOS software