Tagged articles
22 articles
Page 1 of 1
Architect's Guide
Architect's Guide
Sep 30, 2025 · Information Security

Are Software Backdoors Legal? Real Cases, Legal Views, and Hidden Threats

This article examines real‑world anecdotes of hidden backdoors in software, explores how Chinese law treats such vulnerabilities, and outlines the hierarchy of backdoor techniques from simple code tricks to compiler‑level implants, highlighting the security risks they pose.

Software Securitybackdoorcompiler
0 likes · 6 min read
Are Software Backdoors Legal? Real Cases, Legal Views, and Hidden Threats
Top Architecture Tech Stack
Top Architecture Tech Stack
Sep 9, 2024 · Information Security

A Developer’s Hidden Backdoor: MAC Address Modification Blocked by Intentional Code

The article recounts a real‑world incident where a device’s MAC address could not be changed because a previous engineer deliberately disabled the relevant function, discusses the discovery of the backdoor code, and examines the legal and ethical implications of such intentional vulnerabilities.

Code reviewLinux kernelMAC address
0 likes · 4 min read
A Developer’s Hidden Backdoor: MAC Address Modification Blocked by Intentional Code
ITPUB
ITPUB
May 20, 2024 · Information Security

How a Hidden Backdoor in XZ Compression Threatens Global Open‑Source Infrastructure

A recent backdoor implanted in the widely used open‑source compression tool XZ exposes the fragile reliance on volunteer‑maintained software infrastructure, highlighting the massive economic value of open‑source, the sophisticated attack methods employed, and the urgent need for better security and maintenance practices.

Software Securitybackdoorinformation security
0 likes · 6 min read
How a Hidden Backdoor in XZ Compression Threatens Global Open‑Source Infrastructure
Java Tech Enthusiast
Java Tech Enthusiast
Apr 10, 2024 · Information Security

Backdoor Discovered in xz-utils for Fedora 40 and Rawhide

Red Hat’s emergency advisory (CVE‑2024‑3094) warns that malicious code was inserted into xz‑utils 5.6.0/5.6.1, creating a remote‑access backdoor that affects only Fedora 41 and Rawhide, traced to attacker JiaT75 who compromised the Tukaani project for three years before GitHub disabled the repository.

CVE-2024-3094Fedorabackdoor
0 likes · 4 min read
Backdoor Discovered in xz-utils for Fedora 40 and Rawhide
Wukong Talks Architecture
Wukong Talks Architecture
Apr 1, 2024 · Information Security

Investigation of the xz Backdoor Vulnerability and Its Attack Chain

A recent security analysis reveals how a malicious contributor infiltrated the open‑source xz compression tool over two and a half years, inserted a backdoor using IFUNC hooks to compromise OpenSSH, and was eventually uncovered due to a CPU‑spike bug, highlighting severe risks for Linux and macOS systems.

OpenSSHbackdoorinformation security
0 likes · 8 min read
Investigation of the xz Backdoor Vulnerability and Its Attack Chain
Python Programming Learning Circle
Python Programming Learning Circle
Mar 31, 2023 · Information Security

Backdoors in Software: Real-World Cases, Legal Perspectives, and Security Implications

The article recounts real-world examples of hidden backdoors in software—from an Android ROM project and Ken Thompson’s compiler-level exploit—to discuss their legal ambiguity in China, highlight the challenges of detection, and conclude with a call for developers to share their own experiences, alongside a promotional Python course.

AndroidSoftware Securitybackdoor
0 likes · 6 min read
Backdoors in Software: Real-World Cases, Legal Perspectives, and Security Implications
21CTO
21CTO
Dec 3, 2022 · Information Security

How Redigo Malware Exploits Redis CVE-2022-0543 to Plant Stealthy Backdoors

Redigo, a Go‑based malware discovered by AquaSec, continuously scans for unpatched Redis servers vulnerable to CVE‑2022‑0543, uses Redis commands to load a malicious module that creates a hidden backdoor for arbitrary command execution, gathers system data, and may enlist the host in DDoS or crypto‑mining botnets.

CVE-2022-0543backdoormalware
0 likes · 4 min read
How Redigo Malware Exploits Redis CVE-2022-0543 to Plant Stealthy Backdoors
Laravel Tech Community
Laravel Tech Community
Jul 24, 2022 · Information Security

Backdoors in Software Delivery: Real‑World Cases, Legal Perspectives, and Compiler‑Level Vulnerabilities

The article recounts three Zhihu answers that illustrate how hidden backdoors are used in software projects to secure payments, discusses the ambiguous legal status of such practices in China, and explores historic and advanced backdoor techniques ranging from driver‑level tricks to compiler‑injected vulnerabilities.

Legal AnalysisSoftware Securitybackdoor
0 likes · 6 min read
Backdoors in Software Delivery: Real‑World Cases, Legal Perspectives, and Compiler‑Level Vulnerabilities
Liangxu Linux
Liangxu Linux
Jun 26, 2021 · Information Security

Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018

Researchers from 360 Netlab have uncovered RotaJakiro, a stealthy Linux backdoor malware first seen in 2018, which uses ZLIB compression, AES/XOR/ROTATE encryption, and hidden plugins to exfiltrate data and evade detection, with twelve functions yet its true purpose remains unknown.

C2Linux malwareRotaJakiro
0 likes · 4 min read
Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018
Efficient Ops
Efficient Ops
Aug 17, 2020 · Information Security

How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide

This article walks through the discovery, reverse‑engineering, and full reproduction of a malicious Nginx backdoor, detailing its cookie‑based trigger, shell‑reversal mechanism, code analysis, compilation steps, and detection methods for security researchers.

backdoorreverse engineeringreverse shell
0 likes · 9 min read
How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide
21CTO
21CTO
Feb 7, 2019 · Information Security

How the 'SpeakUp' Linux Backdoor Hijacks Servers and Mines Monero

A newly discovered Linux backdoor called SpeakUp, exploiting the ThinkPHP CVE‑2018‑20062 flaw, spreads via a built‑in Python script, hijacks cron for persistence, leverages multiple CVEs to compromise servers, and mines Monero, with infections concentrated in China and South America.

CVELinuxThinkPHP
0 likes · 4 min read
How the 'SpeakUp' Linux Backdoor Hijacks Servers and Mines Monero
MaGe Linux Operations
MaGe Linux Operations
Aug 15, 2017 · Information Security

Xshell Backdoor Discovered in Build 1326 – Critical Security Alert

A critical backdoor was discovered in NetSarang’s Xshell 5 Build 1326, where the nssock2.dll module contains malicious code that contacts a remote domain, affecting multiple NetSarang products; the article details the vulnerability, affected versions, behavior, and provides safe download links.

Remote Code ExecutionVulnerabilitybackdoor
0 likes · 4 min read
Xshell Backdoor Discovered in Build 1326 – Critical Security Alert
Efficient Ops
Efficient Ops
Aug 14, 2017 · Information Security

Critical Xshell Backdoor Alert: How Malicious DLLs Leak Data and What to Do

A recent security advisory reveals that popular remote terminal Xshell versions contain a backdoor in the nssock2.dll component, enabling shellcode to harvest host information, generate monthly DGA domains, and potentially expose sensitive data, prompting immediate version checks and upgrades.

DGAXshellbackdoor
0 likes · 6 min read
Critical Xshell Backdoor Alert: How Malicious DLLs Leak Data and What to Do
dbaplus Community
dbaplus Community
Apr 20, 2017 · Information Security

How Oracle Rootkits Hide Backdoors: Techniques, Code Samples, and Detection

This article explains how vulnerabilities, backdoors, and various Oracle rootkit techniques—ranging from simple package tricks to OS‑level and memory‑level attacks—allow attackers to maintain persistent, hidden access to databases, and it offers concrete detection and mitigation strategies.

OracleRootkitVulnerability
0 likes · 19 min read
How Oracle Rootkits Hide Backdoors: Techniques, Code Samples, and Detection
ITPUB
ITPUB
Feb 23, 2016 · Information Security

How to Detect a Compromised Linux Mint 17.3 ISO and Secure Your System

Linux Mint warned that attackers replaced the official 17.3 Cinnamon ISO with a back‑doored version, and users can verify integrity using MD5 checksums, look for a hidden file, and follow remediation steps to protect their data and reinstall safely.

ISO tamperingLinux MintMD5 verification
0 likes · 4 min read
How to Detect a Compromised Linux Mint 17.3 ISO and Secure Your System