Jump to content

Ac1db1tch3z

From Wikipedia, the free encyclopedia
Ac1db1tch3z
AbbreviationAB
FormationEarly 2000s
PurposeHacking

Ac1db1tch3z (also known as AB for short) were a hacking group most well known for their 0day exploits in Linux[1][2], CVS[3][4] and supply chain attacks on UnrealIRCd[5] and ProFTPD[6].

UnrealIRCd

[edit]

In November 2009 the source code copies for version 3.2.8.1 of UnrealIRCd were replaced with a version containing a backdoor.[5] This backdoor allowed an attacker to run any command on a server running the backdoored version of the software. The backdoor was discovered in June 2010.

References

[edit]
  1. ^ Edge, Jake. "Distribution security response times". LWN. LWN. Retrieved 30 July 2024.
  2. ^ B1tCh3z, Ac1d. "Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation". Exploit-DB. Retrieved 30 July 2024.{{cite web}}: CS1 maint: numeric names: authors list (link)
  3. ^ "The art of exploitation: Autopsy of cvsxpl". Phrack. Phrack. Retrieved 30 July 2024.
  4. ^ B1tCh3z, Ac1d. "CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow". Exploit-DB. Retrieved 30 July 2024.{{cite web}}: CS1 maint: numeric names: authors list (link)
  5. ^ a b Edge, jake. "A backdoor in UnrealIRCd". LWN. LWN. Retrieved 30 July 2024.
  6. ^ "Official ProFTPD source code "backdoored" via a zero day flaw". Secplicity. Retrieved 30 July 2024.