Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Researchers Exploit Hackers’ Abandoned Systems to Track Attacks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Researchers Exploit Hackers’ Abandoned Systems to Track Attacks

Highlights

  • WatchTowr Labs tracks hacker activities via abandoned systems.

  • Researchers hijacked old backdoors using expired domains.

  • The method impacts various global government and educational institutions.

Samantha Reed
Last updated: 8 January, 2025 - 11:48 pm 11:48 pm
Samantha Reed 5 months ago
Share
SHARE

Cybersecurity firm WatchTowr Labs has discovered an innovative approach to monitoring malicious hacking activities by leveraging obsolete systems left by attackers. This technique not only sheds light on persistent vulnerabilities within shadow IT but also offers a potential tool for enhancing network security. By repurposing forgotten infrastructure, the research opens new avenues for understanding and mitigating cyber threats.

Contents
How Did Researchers Identify the Backdoors?What Impact Does This Have on Cyber Defenses?Who Are the Primary Targets Affected?

Efforts to trace hacker activities have traditionally relied on sophisticated detection tools and real-time monitoring. WatchTowr Labs’ method, however, utilizes abandoned domains and outdated infrastructure, offering a complementary strategy that targets remnants of previous malicious operations. This approach may enhance existing cybersecurity frameworks by broadening the scope of threat tracking beyond active vulnerabilities.

How Did Researchers Identify the Backdoors?

The team at WatchTowr Labs, led by CEO Benjamin Harris and researcher Aliz Hammond, identified entry points by analyzing old web shells and expired domains used by malicious groups. They managed to overwrite hardcoded passwords in these shells using the extract function, granting them access to the compromised systems. By purchasing expired domains, often costing as little as $20, they redirected these domains to their logging servers, capturing incoming requests and tracking compromised hosts.

What Impact Does This Have on Cyber Defenses?

“Put simply — we have been hijacking backdoors… and theoretically gave us the power to commandeer and control these compromised hosts,”

Harris and Hammond explained. This capability allows cybersecurity professionals to monitor and potentially disrupt ongoing hacking campaigns. By taking control of these backdoors, defenders can gain valuable intelligence on attacker behaviors and methods, thereby strengthening overall cyber defense strategies.

Who Are the Primary Targets Affected?

The research revealed that various government organizations and educational institutions across countries like Bangladesh, China, Nigeria, Thailand, and South Korea were among the affected targets. The compromised backdoors connected to thousands of unique domains, indicating a widespread impact. The concentration of traffic from specific regions suggests that certain areas are more heavily targeted by these persistent hacking groups.

The researchers ensured their methods remained within legal boundaries by not manipulating systems beyond logging incoming requests and responding minimally. The acquired domains were later handed over to the Shadowserver Foundation to act as sinkholes, preventing further exploitation. This project highlights the ongoing challenges related to managing outdated infrastructure and underscores the importance of maintaining robust cybersecurity practices.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Trump Signs Executive Order Shifting Federal Cybersecurity Priorities

U.S. Authorities Seize $7.7M Linked to North Korean Crypto Laundering

Sean Cairncross Outlines Cyber Coordination Plans to Senate Panel

Feds Seize BidenCash Domains in Crackdown on Stolen Data Market

AI Drives Coding Boom, Sparks Security Debates in Software Development

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article NetEase Launches Live Hero Statistics for Marvel Rivals
Next Article Linda Yaccarino Tackles X Corp’s Future at CES

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Guess “REUSE” and Learn from Daily Puzzles
Gaming
PlusAI Takes Public Path as It Pursues Autonomous Trucking Rollout
Robotics
Tesla Adds Heated Steering Wheel Update for Cold Weather Driving
Electric Vehicle
Industry Leaders Tackle Mobile Robot Integration in Warehouses
Robotics
Tesla Builds 8 Millionth Car as Model Y Leads Global Production
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?