TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

'Fully undetectable' Windows PowerShell backdoor detected

13 pointsby ppjimover 2 years ago

5 comments

sphover 2 years ago
Not fully undetectable after it's been detected now, is it?
technionover 2 years ago
Honestly if if a big enough organisation hasn't disabled untrusted Word macros by policy several years ago their odds of being ransomware victims by now would be close to 100%, and based on what I've seen the odds of having been victims 10+ times are pretty high. One new malware in this space isn't game changing, and new fully undetectable variations show up every day.
raydiatianover 2 years ago
I find it kind of astonishing that Word documents have been an attack vector (a) in the first place and (b) for as long as they have without a sealing patch. Like, why do I need my word document to contain any sort of RPC invoking capability.
评论 #33254465 未加载
1MachineElfover 2 years ago
eBPF has landed in a lot of monitoring/observability use cases. Microsoft has worked on porting eBPF to Windows. I speculate this "undetectable" backdoor problem may be solved with that combination.
vmooreover 2 years ago
What if PowerShell itself <i>is</i> the backdoor? You can remove PowerShell from Windows as a hardening&#x2F;mitigation strategy. I do it on all my systems. I regularly see threat hunters disclosing how 99% of malware leverages the shit out of PowerShell to drop payloads.
评论 #33258910 未加载