<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Backdoor Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/backdoor/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/backdoor/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 22 Apr 2021 14:23:15 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Backdoor Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/backdoor/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 075 Backdoors</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 01:15:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Backdoors]]></category>
		<category><![CDATA[Bot]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Persistence]]></category>
		<category><![CDATA[Persistent Access]]></category>
		<category><![CDATA[RAT]]></category>
		<category><![CDATA[Remote Access Trojan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2500</guid>

					<description><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors. Where does this term Backdoors come from? A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>come to #WeekendWisdom number 75. This week we&#8217;re going to talk about Backdoors.<span id="more-2500"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2500-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4</a></video></div>
<h3>Where does this term Backdoors come from?</h3>
<p>A lot of cyber security terminology uses common terms that relate to the real-world. In the real-world, a backdoor is usually the door of a house or building that is around the side or the back. This door cannot seen from the front of the building.</p>
<h3>In cyber security terminology?</h3>
<p>In cyber security terms a backdoor is a way in that is unseen, into an appliance or device or to a network.</p>
<p>Back in <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/" target="_blank" rel="noopener">#WeekendWisdom number 61</a>, I talked about a backdoor to a set of firewalls. This was where the manufacturer had put in place a hardcoded password. This password enabled them to be able to sign into those firewalls through the backdoor.</p>
<h3>What way can hackers use Backdoors?</h3>
<p>But hackers tend to use a bit more sophisticated methods to establish their backdoors. If they break into your network they usually want to try and keep their access on there. So they will usually install some program, some piece of software on one of the devices on the network to establish what we call a persistent connection, where they can just keep coming back.</p>
<p>That&#8217;s just a piece of software that opens up a backdoor. Sets up a communication with the outside world that the hacker controls and that they can use to come back in and continue doing whatever they want to do on your network.</p>
<p>So that&#8217;s what a backdoor is in cyber security terms.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-075-backdoors/">#WeekendWisdom 075 Backdoors</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-075-lo.mp4" length="33413833" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 061 Zyxel Backdoor</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 02:00:02 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Hardcoded]]></category>
		<category><![CDATA[Hardware Inventory]]></category>
		<category><![CDATA[Inventory]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[User ID]]></category>
		<category><![CDATA[Zyxel]]></category>
		<category><![CDATA[Zyxel Backdoor]]></category>
		<category><![CDATA[Zyxel Networks]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2424</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 61. This week we&#8217;re going to talk about a Zyxel Backdoor. What is this Zyxel Backdoor you are talking about? Just after Christmas, Zyxel networks revealed that some of their firewalls and Wi-Fi access point controllers had been discovered to have a hard-coded user ID and password which would enable anybody&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/">#WeekendWisdom 061 Zyxel Backdoor</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 61. This week we&#8217;re going to talk about a Zyxel Backdoor.<span id="more-2424"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2424-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4</a></video></div>
<h3>What is this Zyxel Backdoor you are talking about?</h3>
<p>Just after Christmas, Zyxel networks revealed that some of their firewalls and Wi-Fi access point controllers had been discovered to have a hard-coded user ID and password which would enable anybody who could connect to that device, to be able to sign into it and take control of it.</p>
<p>Now because it&#8217;s a hard coded user ID and password, it&#8217;s not possible to change that on the device itself. So since then Zyxel has released some updates for their firmware, for those devices. Here is the link to their website, so you can go and find out if you have a device that is affected.</p>
<p><a href="https://www.zyxel.com/support/CVE-2020-29583.shtml" target="_blank" rel="noopener">https://www.zyxel.com/support/CVE-2020-29583.shtml</a></p>
<h3>I&#8217;m not sure whether I have one of those?</h3>
<p>But this then begs the question. Do you know if you have a Zyxel device on your network?</p>
<p>If you remember waaaaay back in <a href="https://www.l2cybersecurity.com/weekendwisdom-001-inventory/" target="_blank" rel="noopener">#WeekendWisdom number 1</a>, I talked about needing to have an inventory of all of your hardware so that you could quickly go and find, if you hear a report like this, you say &#8220;Do I have Zyxel equipment?&#8221; &#8230; check the inventory &#8230; and then if you do have it, you know you have to take action.</p>
<p>So it&#8217;s really important to know what devices you have connected to your network.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-061-zyxel-backdoor/">#WeekendWisdom 061 Zyxel Backdoor</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/01/WeekendWisdom-061-lo.mp4" length="26573927" type="video/mp4" />

			</item>
		<item>
		<title>Draughty Backdoor in popular application.</title>
		<link>https://www.l2cybersecurity.com/draughty-backdoor-popular-application/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 11:45:18 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=911</guid>

					<description><![CDATA[<p>It was revealed a couple of days ago that a widely used application had a backdoor in it. A specific version of CCleaner, a well known utility for doing housekeeping on computers, had been compromised by evil doers. What makes this somewhat more concerning, at first glance, is that CCleaner is a product that is owned&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">Draughty Backdoor in popular application.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-912" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/CCleaner_Backdoor-150x150.png" alt="Backdoor" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/CCleaner_Backdoor-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/09/CCleaner_Backdoor.png 300w" sizes="(max-width: 150px) 100vw, 150px" />It was revealed a couple of days ago that a widely used application had a backdoor in it. A specific version of CCleaner, a well known utility for doing housekeeping on computers, had been compromised by evil doers. <span id="more-911"></span>What makes this somewhat more concerning, at first glance, is that CCleaner is a product that is owned by <a href="https://www.avast.com/">Avast</a>, a well known Security Software vendor. How could they possibly have been hacked?</p>
<p>Actually Avast was not the company that had been breached. It was a company called <a href="https://www.piriform.com">Piriform</a>, who were the original creators of CCleaner. Avast bought Piriform in July 2017, but Piriform were already compromised at that time. I&#8217;ll take you through the timeline, explain what a backdoor is and what you should do if you were affected.</p>
<h2><span style="color: #ff0000;">Update &#8211; 21st September 2017:</span></h2>
<p>Cisco have been continuing to analyse what went on and <a href="http://blog.talosintelligence.com/2017/09/ccleaner-c2-concern.html">have discovered</a> that this backdoor may have been used to target specifically named Corporations, namely Intel, Microsoft, Samsung, Sony, HTC, VMWare, Linksys, Cisco, Vodafone and more. They analysed the controlling server which law enforcement shut down and found that at least 20 machines had some malicious software downloaded to them (what they refer to as &#8220;Stage 2 Payloads&#8221;). This number could possibly rise, as this is an active investigation.</p>
<p>While this appears to be a targeted attack, I would still urge extreme caution. If you used the compromised version of CCleaner, please do follow the suggestions below, which will mitigate any risk of compromise.</p>
<p>The remainder of this article below remains as originally posted.</p>
<h2>Timeline of events:</h2>
<ul>
<li>First week in July: It would seem this was when hackers compromised Piriform&#8217;s development systems.</li>
<li>July 18: Avast buys Piriform, the company that created CCleaner.</li>
<li>August 15: CCleaner version 5.33 is released. The CCleaner 5.33.6162 installer includes the backdoor, but this only works on 32-bit systems.</li>
<li>August 24: CCleaner Cloud version 1.07.3191 is released and this also includes the backdoor.</li>
<li>September 12: A company called Morphisec had detected some unusual activity around CCleaner 5.33 and so they notified Avast and also Cisco. Avast starts its own investigation and also notifies US law enforcement. Cisco also starts its own investigation.</li>
<li>September 14: Cisco tells Avast what it has found and also around the same time they had taken some steps to prevent the backdoor from being effective.</li>
<li>September 15: Following a collaboration between Avast and law enforcement, the evil doers server that controlled the backdoor was shut down. Avast releases a clean version of CCleaner 5.34 and CCleaner Cloud 1.07.3214 that remove the backdoor.</li>
<li>September 18: The incident comes to public attention, following Avast, Cisco and Morphisec reports.</li>
</ul>
<h2>A backdoor might not sound dangerous, but it is:</h2>
<p>What happened in this case was the bad guys managed to gain access to Piriform&#8217;s software development systems and they implanted computer code that created a backdoor in CCleaner. This went undetected and so the compromised version of CCleaner, version 5.33 was released. People would have downloaded this, or updated to it, as paid versions of CCleaner have an automatic update feature.</p>
<p>So the backdoor in this case, effectively meant that version of CCleaner would have occasionally made contact with servers on the internet controlled by the bad guys and look for for new instructions. The hackers could have put any malicious code they want on these servers, and this would have almost certainly affected the victims machine, regardless of the protections that were in place (Antivirus, Firewalls, etc.). They could have loaded Ransomware onto the victim or something that would have stolen banking credentials.</p>
<h2>What you should do if you were affected:</h2>
<p><a href="https://blog.avast.com/update-to-the-ccleaner-5.33.6162-security-incident">Avast</a> recommend simply installing version 5.34 will remove the nasty backdoor. Cisco&#8217;s detailed <a href="http://blog.talosintelligence.com/2017/09/avast-distributes-malware.html">write-up</a> doesn&#8217;t offer much in the way of guidance, but their work on this pretty much hobbled the malicious software.</p>
<p>However, looking at the timeline, the infected software was available from 15th August and nothing was detected until 12th September. So that&#8217;s 27 days where this thing <em><strong>could</strong></em> have been doing something evil. There&#8217;s no evidence to say that anything had happened, but there&#8217;s no evidence that nothing happened. It&#8217;s <em><strong>possible</strong></em> that other malicious software has been deployed on affected machines.</p>
<p>I would therefore be of the view that any machine that had this software installed, is potentially still compromised. The safest course of action is to wipe the machine and reset to factory settings. I would also change any passwords for e-mail, banking, social media and other online services. Maybe even bite the bullet and give your online accounts the <a href="https://www.l2cybersecurity.com/vii-use-two-factor-authentication/">best protection possible</a>. I know this is a pain in the ass, but because there is uncertainty, I wouldn&#8217;t take the risk,</p>
<p>I had the free version 5.32 of CCleaner installed on my personal desktop, so I don&#8217;t need to worry. I might wait for the dust to settle before I upgrade it though.</p>
<p>The post <a href="https://www.l2cybersecurity.com/draughty-backdoor-popular-application/">Draughty Backdoor in popular application.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
