Ac1db1tch3z (also known as AB for short) were a hacking group most well known for their 0day exploits in Linux,[1][2] CVS[3][4] and supply chain attacks on UnrealIRCd[5] and ProFTPD.[6]

Ac1db1tch3z
AbbreviationAB
FormationEarly 2000s
PurposeHacking

UnrealIRCd

edit

In November 2009 the source code copies for version 3.2.8.1 of UnrealIRCd were replaced with a version containing a backdoor.[5] This backdoor allowed an attacker to run any command on a server running the backdoored version of the software. The backdoor was discovered in June 2010.

References

edit
  1. ^ Edge, Jake. "Distribution security response times". LWN. Retrieved 30 July 2024.
  2. ^ B1tCh3z, Ac1d (16 September 2010). "Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation". Exploit-DB. Retrieved 30 July 2024.{{cite web}}: CS1 maint: numeric names: authors list (link)
  3. ^ "The art of exploitation: Autopsy of cvsxpl". Phrack. Retrieved 30 July 2024.
  4. ^ B1tCh3z, Ac1d (25 June 2004). "CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow". Exploit-DB. Retrieved 30 July 2024.{{cite web}}: CS1 maint: numeric names: authors list (link)
  5. ^ a b Edge, jake. "A backdoor in UnrealIRCd". LWN. Retrieved 30 July 2024.
  6. ^ "Official ProFTPD source code "backdoored" via a zero day flaw". Secplicity. 7 December 2010. Retrieved 30 July 2024.