Oct 24, 2023NewsroomCyber Threat / Vulnerability The backdoor implanted on Cisco devices by exploiting a pair of zero-day flaws in IOS XE software has been modified by the threat actor so as to escape visibility via previous fingerprinting methods. “Investigated network traffic to a compromised device has shown that the threat actor has upgraded the […]
In an era where data security is paramount, the recent revelations about firmware backdoors implanted by Chinese government-backed hackers serve as a stark reminder of the evolving threat landscape. BlackTech is infiltrating routers to gain undetectable backdoor access to the networks of companies in the US and Japan. This incident underscores the vulnerabilities in our […]
Research by: Jiri Vinopal Highlights Check Point Research (CPR) introduces a new method for running hidden implanted code in ReadyToRun (R2R) compiled .NET binaries, R2R stomping. We explain the implementation of R2R stomping with a focus on its internals. The resulting problems of the R2R stomping technique will affect the work of the reverse engineers […]