WhisperX tag archive

#Backdoor

This page collects WhisperX intelligence signals tagged #Backdoor. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (12)

The Lab · 2026-04-14 18:53:01 · TechCrunch

1. WordPress Plugin Supply Chain Breach: Dozens of Plugins Hijacked After Corporate Sale

A critical supply chain attack has compromised the security of thousands of WordPress websites. Dozens of popular plugins were allegedly hijacked to push malware after their ownership was transferred to a new corporate entity. This incident represents a sophisticated breach of trust, weaponizing the routine process of ...

The Lab · 2026-04-15 11:52:44 · Golem.de

2. Angreifer übernimmt Plugin-Firma: 30+ WordPress-Erweiterungen mit Backdoor infiziert

Ein Angreifer hat die Kontrolle über eine Entwicklungsfirma erlangt, die mehr als 30 WordPress-Plugins veröffentlicht. Kurz nach der Übernahme schleuste der Angreifer Nutzern heimlich eine Backdoor in die Software ein. Dieser gezielte Angriff auf die Lieferkette gefährdet Tausende von Websites, die auf die betroffenen ...

The Lab · 2026-04-21 08:52:57 · Golem.de

3. Claude-Desktop-App: KI-Tool von Anthropic installiert ungefragt Backdoor auf Nutzer-PCs

Die offizielle Desktop-App für die KI Claude von Anthropic hat Nutzern ohne deren Wissen oder Einwilligung eine potenzielle Backdoor auf deren Computer installiert. Ein Datenschützer entdeckte den verdächtigen Eintrag im Browser nur durch Zufall. Diese versteckte Komponente, die im System hinterlassen wird, könnte theo...

The Lab · 2026-04-21 15:22:30 · Next INpact

4. WordPress : 30 plugins compromis après une vente suspecte sur Flippa

Une trentaine d'extensions WordPress populaires ont été discrètement vérolées, transformant des sites web en cibles faciles pour des attaquants. L'attaque ne provient pas d'une vulnérabilité technique classique, mais d'un changement de propriétaire malveillant. Après l'acquisition de l'entreprise indienne EssentialPlug...

The Lab · 2026-05-05 18:31:42 · GitHub Issues

5. ScarCruft Compromises Gaming Platform to Deploy BirdCall Backdoor on Android and Windows

The ScarCruft threat group—assessed with high confidence as a North Korean state-sponsored operation—has carried out a targeted supply chain compromise against a gaming platform, deploying the BirdCall backdoor on both Android and Windows systems. The campaign represents a strategic pivot by the actor toward entertainm...

The Lab · 2026-05-09 04:31:41 · r/netsec

6. DAEMON Tools Supply Chain Attack: Backdoor Active Since April 8, 2026

A supply chain attack has compromised the widely used DAEMON Tools software, with a backdoor embedded in legitimate installers distributed to users since April 8, 2026. The attack was disclosed via r/netsec and linked to a technical analysis from Kaspersky's Securelist, confirming that the popular disk imaging utility ...

The Lab · 2026-05-10 18:31:50 · r/blueteamsec

7. Lorem Ipsum Malware: How Trojanized Microsoft Teams Installers Are Deploying Multi-Stage Loaders and Backdoors

Security researchers have identified a sophisticated malware campaign using trojanized Microsoft Teams installers to deliver multi-stage loaders and backdoors against enterprise targets. The campaign, tracked under the name Lorem Ipsum, represents a concerning evolution in supply chain attacks that leverage trusted sof...

The Lab · 2026-05-11 23:48:31 · The Verge

8. Yarbo Backtracks: Robot Lawn Mower Maker Pledges to Remove Intentional Backdoor After Global Hijack Vulnerability Exposed

Yarbo, the company behind a robot lawn mower that security researchers found could be hijacked from anywhere in the world, has committed to completely removing the intentional backdoor access that created the vulnerability. The reversal comes after Andreas Makris, a security researcher, demonstrated how malicious actor...

The Lab · 2026-05-12 12:48:35 · Mastodon:hachyderm.io:#infosec

9. WordPress Malware Fingerprint Exposes Botched Backdoor Deployments Across Thousands of Sites

A specific malware signature linked to WordPress compromise campaigns has surfaced, revealing a potentially large-scale attack operation with a notable technical flaw. Security researchers are pointing to the hash identifier "Bwn6fOzW0Zc6VfNNCAo1bWRmG2a" as a hunting marker for malicious payloads targeting WordPress in...

The Lab · 2026-05-13 09:18:25 · Mastodon:mastodon.social:#infosec

10. Mastodon Discussion Flags Potential BitLocker Bypass Method as Possible Law Enforcement Backdoor

A brief discussion on Mastodon has brought attention to what some users are describing as a significant BitLocker bypass technique, with comparisons drawn to a potential government or law enforcement backdoor mechanism. The conversation, referencing a post on cyberplace.social, describes the technique under the label "...

The Lab · 2026-05-13 13:18:37 · Mastodon:mastodon.social:#cybersecurity

11. Typosquatting npm Packages Exploit Claude Code SessionStart Hooks to Deploy Persistent Developer Backdoors

A newly identified supply chain attack is targeting software developers through typosquatting npm packages that weaponize Claude Code's SessionStart hooks to establish persistent backdoors on infected systems. The campaign delivers a statically linked, UPX-compressed ELF binary that activates during package installatio...

The Lab · 2026-05-13 17:18:30 · Mastodon:mastodon.social:#privacy

12. YellowKey Exploit Bypasses BitLocker on Windows 11 Via USB Stick; Researcher Flags Possible Intentional Backdoor

A newly documented exploit dubbed "YellowKey" reportedly allows attackers to bypass BitLocker full-disk encryption on Windows 11 and Windows Server systems using nothing more than a USB stick and a basic reboot technique. The disclosure has raised immediate concerns within the security community regarding the integrity...