Hacker News
- XZ backdoor story – Initial analysis https://securelist.com/xz-backdoor-story-part-1/112354/ 250 comments
- New SUPERNOVA backdoor found in SolarWinds cyberattack analysis https://www.bleepingcomputer.com/news/security/new-supernova-backdoor-found-in-solarwinds-cyberattack-analysis/ 5 comments
- An Analysis of Godlua Backdoor https://blog.netlab.360.com/an-analysis-of-godlua-backdoor-en/ 5 comments
- Analysis of the Backdoored Backdoor https://rpw.sh/blog/2015/12/21/the-backdoored-backdoor/ 9 comments
- Analysis of the Linux backdoor used in Freenode IRC network compromise https://www.nccgroup.com/en/blog/2014/10/analysis-of-the-linux-backdoor-used-in-freenode-irc-network-compromise/ 15 comments
- ANALYSIS-Crypto exchanges won't bar Russians, raising fears of sanctions backdoor https://www.reuters.com/article/ukraine-crisis-crypto-exchanges-idCNL4N2V44E3 27 comments europe
- Kaspersky analysis of the backdoor in XZ https://securelist.com/xz-backdoor-story-part-1/112354/ 2 comments reverseengineering
- A technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitation https://cybergeeks.tech/a-technical-analysis-of-the-saltwater-backdoor-used-in-barracuda-0-day-vulnerability-cve-2023-2868-exploitation/ 3 comments reverseengineering
- Multiple Linux Backdoors Discovered Targeting Bitcoin Core Developer — Technical Analysis https://lordx64.medium.com/multiple-linux-backdoors-discovered-targeting-bitcoin-core-developer-technical-analysis-793f8491f561 7 comments bitcoin
- [P] What if AB testing is impossible to setup? I wrote a blog to measure impact using backdoor adjustment, a type of causal analysis https://doordash.engineering/2022/06/02/using-back-door-adjustment-causal-analysis-to-measure-pre-post-effects/ 2 comments machinelearning
- A step-by-step analysis of the Russian Turla backdoor called TinyTurla https://cybergeeks.tech/a-step-by-step-analysis-of-the-russian-apt-turla-backdoor-called-tinyturla/ 5 comments netsec
- A step-by-step analysis of the Russian APT Turla backdoor called TinyTurla https://cybergeeks.tech/a-step-by-step-analysis-of-the-russian-apt-turla-backdoor-called-tinyturla/ 6 comments reverseengineering
- Analysis: Crypto exchanges won't bar Russians, raising fears of sanctions backdoor https://www.reuters.com/markets/europe/crypto-exchanges-wont-bar-russians-raising-fears-sanctions-backdoor-2022-03-02/ 5 comments cryptocurrency
- Analysis of a Kubernetes hack -- Backdooring through kubelet https://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c 8 comments netsec
- DoublePulsar "Initial SMB Backdoor" Ring 0 Payload Analysis https://zerosum0x0.blogspot.com/2017/04/doublepulsar-initial-smb-backdoor-ring.html 9 comments netsec
- Some Analysis of the Backdoored Backdoor (Juniper) https://rpw.sh/blog/2015/12/21/the-backdoored-backdoor/ 4 comments programming
- Some analysis of the Juniper Dual_EC backdoor https://rpw.sh/blog/2015/12/21/the-backdoored-backdoor/ 3 comments netsec
- Analysis of the Linux backdoor used in freenode IRC network compromise https://www.nccgroup.com/en/blog/2014/10/analysis-of-the-linux-backdoor-used-in-freenode-irc-network-compromise/ 10 comments linux
- An In-depth Analysis of Linux/Ebury (OpenSSH backdoor and credential stealer) http://www.welivesecurity.com/2014/02/21/an-in-depth-analysis-of-linuxebury/ 2 comments sysadmin
- Kaspersky's analysis of the Careto Backdoor incl. the Linux variant https://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf 9 comments linux
- Analysis: Is there a backdoor in Truecrypt? Is Truecrypt a CIA honeypot? http://www.privacylover.com/encryption/analysis-is-there-a-backdoor-in-truecrypt-is-truecrypt-a-cia-honeypot/ 21 comments privacy
- Analysis: Is there a backdoor in Truecrypt? Is Truecrypt a CIA honeypot? http://www.privacylover.com/encryption/analysis-is-there-a-backdoor-in-truecrypt-is-truecrypt-a-cia-honeypot/ 9 comments netsec