Glutton: The Cyber Heist Backfires – When Hackers Hack Hackers!

Cybersecurity researchers have uncovered Glutton, a PHP-based backdoor targeting cybercriminals in a “no honor among thieves” twist. Linked to the notorious Winnti group, Glutton turns the tables by exploiting cybercrime resources and injecting itself into PHP frameworks, creating a recursive attack chain that uses the attackers’ own tactics against them.

Pro Dashboard

Hot Take:

Who needs spy movies when you’ve got cyber espionage drama like this? Glutton proves that even in the world of cybercrime, it’s a “dog-eat-dog” situation. It’s like Ocean’s Eleven meets Mr. Robot, with hackers hacking hackers while everyone else just tries to keep their data out of the crossfire. Move over Hollywood, there’s a new script in town.

Key Points:

  • Glutton is a PHP-based backdoor targeting systems in China, the US, Cambodia, Pakistan, and South Africa.
  • Attributed by QiAnXin XLab to the Chinese group Winnti (APT41) but without solid proof.
  • Designed to exploit PHP frameworks and lacks typical stealth techniques.
  • Unorthodoxly advertised on cybercrime forums to attack other cybercriminals.
  • Features 22 commands for diverse cyber operations and employs HackBrowserData for sensitive data theft.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?