Get the latest tech news
Islamic Nonprofit Infiltrated for 3 Years With Silent Backdoor
Saudi Arabia charity was under surveillance with the modified reverse proxy tool, researchers discovered.
"Reverse proxies function by allowing covert communications channels to be established between internal systems on a compromised network and external servers controlled by an adversarial group," says Christoph Cemper, founder and CEO of AIPRM. Cemper explains that adversaries frequently take steps to disguise these proxy-facilitated connections as normal Web or Internet activity, such as routing communications over ports associated with common protocols like HTTPS and embedding the redirects within legitimate domain names or IP addresses. Zardoor establishes a persistent backdoor that communicates with the attackers' command-and-control (C2) setup, allowing them to issue commands, such as to deploy updated malware packages or exfiltrate data.
Or read this on r/technology