Thousands of Live Hacker Backdoors Found in Expired Domains

Ever thought hackers worked tirelessly to infiltrate systems? Turns out, some don’t even break a sweat. Welcome to the era of “mass-hacking-on-autopilot.” Let’s uncover how abandoned domains have become a gateway for cybercriminals and what it means for us all.

Cybersecurity firm watchTowr has uncovered over 4,000 active hacker backdoors exploiting expired domains and abandoned infrastructure. This discovery has revealed vulnerabilities in government and educational institutions worldwide, with compromised systems linked to notorious hacking groups.


How It Works:

  • Hackers gain access to systems via web shells—snippets of malicious code placed on servers during breaches. These shells allow attackers to control compromised systems remotely.
  • When attackers abandon their command-and-control domains, but these domains are re-registered by others, the systems “call home” to the new owner.
  • Researchers at watchTowr acquired expired hacker domains and monitored their activity, discovering thousands of compromised systems actively attempting to reconnect.


Who’s Targeted:

  • Government Institutions: Systems in countries like Bangladesh, China, and Nigeria were among the most vulnerable.
  • Educational Entities: A common target due to often-outdated infrastructure.
  • General Organizations: Any system unknowingly housing dormant web shells.


Real-Life Example:

One alarming case tied to the infamous Lazarus Group (a North Korean hacking collective) uncovered 3,900 compromised domains. These backdoors used a .gif image loaded from the attackers’ servers to pinpoint the location of affected systems.


Why You Should Care:

Imagine your organization unknowingly hosting a backdoor, exposing sensitive data or infrastructure to global criminals. The risks range from financial loss to national security breaches. Even worse, some older web shells betray their own users, making the hacking ecosystem an unpredictable playground.


How to Protect Yourself:

  1. Regular Infrastructure Audits: Routinely check for outdated or abandoned systems and ensure no unused domains are linked to critical infrastructure.
  2. Monitor for Web Shells: Use advanced cybersecurity tools to detect and remove malicious code from your servers.
  3. Secure Expired Domains: Re-register expired domains associated with your organization to prevent unauthorized use.
  4. Update Security Protocols: Implement robust defenses like two-factor authentication and intrusion detection systems to mitigate risks.
  5. Collaborate with Cybersecurity Agencies: Engage with organizations like The Shadowserver Foundation, which works to neutralize risks from compromised domains.


Quick Tips & Updates:

  • Quick Tip #1: Did you know? Over 70% of security breaches involve outdated software or abandoned infrastructure.
  • Quick Tip #2: Pro Tip: Regularly renew your domains—even the ones no longer in use—to avoid potential exploits.


This investigation by watchTowr is a wake-up call for organizations to address their cybersecurity hygiene. Don’t let your abandoned domains become a hacker’s treasure trove.


Key Terms Explained:

  • Web Shells: Malicious scripts that allow hackers remote access to compromised systems.
  • Lazarus Group: A North Korean cybercriminal collective linked to numerous global cyberattacks.
  • Mass-Hacking-on-Autopilot: A hacking strategy using minimal effort to control numerous compromised systems via dormant backdoors.

To read more, kindly find source article here


I thought I was doing something good': The scam that took Judith Boivin's life savings