Summary: Shadow IT poses significant risks for organizations, as forgotten systems can become entry points for data breaches. Recent research by watchTowr Labs reveals that hackers also leave behind vulnerabilities in abandoned infrastructure, which can be exploited. This study highlights the importance of vigilance in cybersecurity, as both attackers and defenders can make critical mistakes.
Threat Actor: Lazarus Group | Lazarus Group
Victim: Various government organizations and universities | Various government organizations and universities
Threat Actor: Lazarus Group | Lazarus Group
Victim: Various government organizations and universities | Various government organizations and universities
Keypoints :
- WatchTowr Labs identified thousands of live backdoors through abandoned infrastructure and expired domains.
- Researchers were able to hijack backdoors and monitor compromised hosts legally, using expired domains costing as little as $20.
- The findings reveal that attackers also make mistakes, such as leaving unprotected web shells, emphasizing the need for vigilance in cybersecurity.
Source: https://www.cysecurity.news/2025/01/researchers-hijack-hacker-backdoors.html