Premium Only Content
Sexy Ukranian Teen Makes Money | Reps Hire a Hacker Pro
Hire a Hacker Review: New Backdoor Created Using Leaked CIA's Hive Malware Discovered in the Wild
Unidentified threat actors have deployed a new backdoor that borrows its features from the U.S. Central Intelligence Agency (CIA)'s Hive multi-platform malware suite, the source code of which was released by WikiLeaks in November 2017.
"This is the first time we caught a variant of the CIA Hive attack kit in the wild, and we named it xdr33 based on its embedded Bot-side certificate CN=xdr33," Qihoo Netlab 360's Alex Turing and Hui Wang said in a technical write-up published last week.
xdr33 is said to be propagated by exploiting an unspecified N-day security vulnerability in F5 appliances. It communicates with a command-and-control (C2) server using SSL with forged Kaspersky certificates.
The intent of the backdoor, per the Chinese cybersecurity firm, is to harvest sensitive information and act as a launchpad for subsequent intrusions. It improves upon Hive by adding new C2 instructions and functionalities, among other implementation changes.
The ELF sample further operates as a Beacon by periodically exfiltrating system metadata to the remote server and executing commands issued by the C2.
This includes the ability to download and upload arbitrary files, run commands using cmd, and launch shell, in addition to updating and erasing traces of itself from the compromised host.
The malware also incorporates a Trigger module that's designed to eavesdrop on network traffic for a specific "trigger" packet in order to extract the C2 server mentioned in the IP packet's payload, establish connection, and wait for the execution of commands sent by the C2.
"It is worth noting that Trigger C2 differs from Beacon C2 in the details of communication; after establishing an SSL tunnel, [the] bot and Trigger C2 use a Diffie-Helllman key exchange to establish a shared key, which is used in the AES algorithm to create a second layer of encryption," the researchers explained.
For business inquiries contact: #TeamTonyCapo
#hireahackerpro #teamtonycapo #tonycapo #hireahacker #hacker #prohacker #hackerforhire #python #ai #hackerinc #programming
-
10:02
MichaelBisping
13 hours agoBISPING: "Was FURY ROBBED?!" | Oleksandr Usyk vs Tyson Fury 2 INSTANT REACTION
2.66K7 -
8:08
Guns & Gadgets 2nd Amendment News
2 days ago16 States Join Forces To Sue Firearm Manufacturers Out of Business - 1st Target = GLOCK
55.9K56 -
10:17
Dermatologist Dr. Dustin Portela
1 day ago $7.81 earnedOlay Cleansing Melts: Dermatologist's Honest Review
53.6K -
1:02:20
Trumpet Daily
2 days ago $26.68 earnedObama’s Fake World Comes Crashing Down - Trumpet Daily | Dec. 20, 2024
35.1K34 -
6:29
BIG NEM
22 hours agoCultivating God Mode: Ancient Taoist NoFap Practices
30.5K6 -
30:53
Uncommon Sense In Current Times
1 day ago $7.99 earned"Pardon or Peril? How Biden’s Clemency Actions Could Backfire"
50.6K3 -
40:01
CarlCrusher
20 hours agoSkinwalker Encounters in the Haunted Canyons of Magic Mesa - ep 4
47K2 -
59:44
PMG
1 day ago $5.74 earned"BETRAYAL - Johnson's New Spending Bill EXPANDS COVID Plandemic Powers"
54.9K21 -
6:48:50
Akademiks
18 hours agoKendrick Lamar and SZA disses Drake and BIG AK? HOLD UP! Diddy, Durk, JayZ update. Travis Hunter RUN
176K30 -
11:45:14
Right Side Broadcasting Network
9 days agoLIVE REPLAY: TPUSA's America Fest Conference: Day Three - 12/21/24
360K28