Posted by malvuln on Dec 13

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/8b484576f928c256277016104cc364c2.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.BackAttack.20
Vulnerability: Unauthenticated Remote Command Execution
Description: BackAtTack 2.0 By CurrenTChaoSGroup(CCG) by default listens on
TCP ports 80 and 11131. The malware features a remote web interface where
you can…
Read More – Full Disclosure


By |2021-12-13T12:19:25-05:00December 13th, 2021|