Ac1db1tch3z
Appearance
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Abbreviation | AB |
---|---|
Formation | Early 2000s |
Purpose | Hacking |
Ac1db1tch3z (also known as AB for short) were a hacking group most well known for their 0day exploits in Linux,[1][2] CVS[3][4] and supply chain attacks on UnrealIRCd[5] and ProFTPD.[6]
UnrealIRCd
[edit]In November 2009 the source code copies for version 3.2.8.1 of UnrealIRCd were replaced with a version containing a backdoor.[5] This backdoor allowed an attacker to run any command on a server running the backdoored version of the software. The backdoor was discovered in June 2010.
References
[edit]- ^ Edge, Jake. "Distribution security response times". LWN. Retrieved 30 July 2024.
- ^ B1tCh3z, Ac1d (16 September 2010). "Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation". Exploit-DB. Retrieved 30 July 2024.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ "The art of exploitation: Autopsy of cvsxpl". Phrack. Retrieved 30 July 2024.
- ^ B1tCh3z, Ac1d (25 June 2004). "CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow". Exploit-DB. Retrieved 30 July 2024.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ a b Edge, jake. "A backdoor in UnrealIRCd". LWN. Retrieved 30 July 2024.
- ^ "Official ProFTPD source code "backdoored" via a zero day flaw". Secplicity. 7 December 2010. Retrieved 30 July 2024.