Ac1db1tch3z

(Learn how and when to remove this message)
Hacker group
Ac1db1tch3z
AbbreviationAB
FormationEarly 2000s
PurposeHacking

Ac1db1tch3z (also known as AB for short) were a hacking group most well known for their 0day exploits in Linux,[1][2] CVS[3][4] and supply chain attacks on UnrealIRCd[5] and ProFTPD.[6]

UnrealIRCd

In November 2009 the source code copies for version 3.2.8.1 of UnrealIRCd were replaced with a version containing a backdoor.[5] This backdoor allowed an attacker to run any command on a server running the backdoored version of the software. The backdoor was discovered in June 2010.

  • v
  • t
  • e
Hacking in the 2000s
← 1990s Timeline 2010s →
Incidents
2004
  • Titan Rain (2003–2006)
  • Operation Firewall
2005
2007
  • Cyberattacks on Estonia
  • Operation: Bot Roast
2008
2009
  • Operation Troy
  • Operation Aurora (findings published in 2010)
  • WebcamGate (2008–2010)
Groups
Individuals
Darknets
  • Bluehell IRC
Hacking forums
  • ryan1918
  • unkn0wn.eu
  • darksun.ws
Vulnerabilities
discovered
Malware
2000
2001
2002
  • Simile
2003
2004
2005
2006
2007
  • Storm
  • ZeuS
  • Black Energy 1
2008
2009

References

  1. ^ Edge, Jake. "Distribution security response times". LWN. Retrieved 30 July 2024.
  2. ^ B1tCh3z, Ac1d (16 September 2010). "Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation". Exploit-DB. Retrieved 30 July 2024.{{cite web}}: CS1 maint: numeric names: authors list (link)
  3. ^ "The art of exploitation: Autopsy of cvsxpl". Phrack. Retrieved 30 July 2024.
  4. ^ B1tCh3z, Ac1d (25 June 2004). "CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow". Exploit-DB. Retrieved 30 July 2024.{{cite web}}: CS1 maint: numeric names: authors list (link)
  5. ^ a b Edge, jake. "A backdoor in UnrealIRCd". LWN. Retrieved 30 July 2024.
  6. ^ "Official ProFTPD source code "backdoored" via a zero day flaw". Secplicity. 7 December 2010. Retrieved 30 July 2024.