It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. The article may be deleted if this message remains in place for seven days, i.e., after 01:07, 25 November 2024 (UTC). Find sources: "Ac1db1tch3z" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|Ac1db1tch3z|concern=Non-notable per [[WP:NORG]]. See the analysis of sources on the talk page.}} ~~~~ |
Another editor has reviewed this page's proposed deletion and endorses both the proposal and the reason given above. If you remove the {{proposed deletion/dated}} tag above, please also remove this {{Proposed deletion endorsed}} tag. |
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Ac1db1tch3z (also known as AB for short) were a hacking group most well known for their 0day exploits in Linux,[1][2] CVS[3][4] and supply chain attacks on UnrealIRCd[5] and ProFTPD.[6]
Abbreviation | AB |
---|---|
Formation | Early 2000s |
Purpose | Hacking |
UnrealIRCd
editIn November 2009 the source code copies for version 3.2.8.1 of UnrealIRCd were replaced with a version containing a backdoor.[5] This backdoor allowed an attacker to run any command on a server running the backdoored version of the software. The backdoor was discovered in June 2010.
References
edit- ^ Edge, Jake. "Distribution security response times". LWN. Retrieved 30 July 2024.
- ^ B1tCh3z, Ac1d (16 September 2010). "Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation". Exploit-DB. Retrieved 30 July 2024.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ "The art of exploitation: Autopsy of cvsxpl". Phrack. Retrieved 30 July 2024.
- ^ B1tCh3z, Ac1d (25 June 2004). "CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow". Exploit-DB. Retrieved 30 July 2024.
{{cite web}}
: CS1 maint: numeric names: authors list (link) - ^ a b Edge, jake. "A backdoor in UnrealIRCd". LWN. Retrieved 30 July 2024.
- ^ "Official ProFTPD source code "backdoored" via a zero day flaw". Secplicity. 7 December 2010. Retrieved 30 July 2024.