Ac1db1tch3z Explained

Ac1db1tch3z
Abbreviation:AB
Formation:Early 2000s
Founders:-->
Defunct:-->
Vat Id:(for European organizations) -->
Purpose:Hacking
Area Served:or
Region:-->
Product:-->
Method:-->
Field:-->
Languages:-->
Owners:-->
Publication:-->
Parent Organisation:-->
Former Name:-->

Ac1db1tch3z (also known as AB for short) were a hacking group most well known for their 0day exploits in Linux,[1] [2] CVS[3] [4] and supply chain attacks on UnrealIRCd[5] and ProFTPD.[6]

UnrealIRCd

In November 2009 the source code copies for version 3.2.8.1 of UnrealIRCd were replaced with a version containing a backdoor. This backdoor allowed an attacker to run any command on a server running the backdoored version of the software. The backdoor was discovered in June 2010.

Notes and References

  1. Web site: Edge . Jake . Distribution security response times . LWN . 30 July 2024.
  2. Web site: Ac1d . B1tCh3z . Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation . Exploit-DB . 16 September 2010 . 30 July 2024.
  3. Web site: The art of exploitation: Autopsy of cvsxpl . Phrack . 30 July 2024.
  4. Web site: Ac1d . B1tCh3z . CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow . Exploit-DB . 25 June 2004 . 30 July 2024.
  5. Web site: Edge . jake . A backdoor in UnrealIRCd . LWN . 30 July 2024.
  6. Web site: Official ProFTPD source code "backdoored" via a zero day flaw . Secplicity . 7 December 2010 . 30 July 2024.