Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. Other Discussions
  3. The Insider News
  4. Researchers unearth Windows backdoor that’s unusually stealthy

Researchers unearth Windows backdoor that’s unusually stealthy

Scheduled Pinned Locked Moved The Insider News
comwindows-admin
3 Posts 2 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • K Offline
    K Offline
    Kent Sharkey
    wrote on last edited by
    #1

    Ars Technica[^]:

    Frebniis abuses Microsoft IIS to smuggle malicious commands in web traffic.

    Internet Insecurity Service

    Richard DeemingR 1 Reply Last reply
    0
    • K Kent Sharkey

      Ars Technica[^]:

      Frebniis abuses Microsoft IIS to smuggle malicious commands in web traffic.

      Internet Insecurity Service

      Richard DeemingR Offline
      Richard DeemingR Offline
      Richard Deeming
      wrote on last edited by
      #2

      Quote:

      ... smuggle and execute malicious code into protected regions of an already compromised network

      If your network is already compromised, then all bets are off. As Raymond Chen is fond of saying: "It rather involved being on the other side of this airtight hatchway". :)


      "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

      "These people looked deep within my soul and assigned me a number based on the order in which I joined" - Homer

      K 1 Reply Last reply
      0
      • Richard DeemingR Richard Deeming

        Quote:

        ... smuggle and execute malicious code into protected regions of an already compromised network

        If your network is already compromised, then all bets are off. As Raymond Chen is fond of saying: "It rather involved being on the other side of this airtight hatchway". :)


        "These people looked deep within my soul and assigned me a number based on the order in which I joined." - Homer

        K Offline
        K Offline
        Kent Sharkey
        wrote on last edited by
        #3

        Very true. But, in this case I figured there are so many ways to bork IIS remotely, that it was worth reporting.

        TTFN - Kent

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups