skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition

Researchers Exploit Abandoned Backdoors in Compromised Systems

/ 1 min read

🕳️🔑 Mass Hacking on Autopilot: Researchers Exploit Abandoned Backdoors. A team of researchers has successfully hijacked over 4,000 compromised systems by exploiting abandoned backdoors in web shells, allowing them to gain access without direct effort. This method involved registering expired domains linked to these backdoors, enabling the researchers to monitor and control compromised hosts. Their findings revealed significant targets, including multiple compromised government entities and universities across various countries. The researchers emphasize the ongoing vulnerabilities in abandoned infrastructure and the potential for attackers to make similar mistakes, highlighting the need for continuous security testing to mitigate emerging threats. The research underscores the importance of responsible domain management to prevent exploitation.

Source
{entry.data.source.title}
Original