Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

This week’s science news: Anomalies inside Earth, the Artemis II leak and how psychedelics can help treat PTSD

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit Triofox flaw to install remote access tools via antivirus
Identity

Hackers exploit Triofox flaw to install remote access tools via antivirus

userBy userNovember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 10, 2025Ravi LakshmananVulnerability/Incident Response

Google’s Mandiant Threat Defense announced Monday that it has discovered an n-day exploit of a now-patched security flaw in Gladinet’s Triofox file sharing and remote access platform.

This critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration page, which could result in the upload and execution of arbitrary payloads.

The technology giant said it observed a threat cluster tracked as UNC6485 weaponizing the flaw as far back as August 24, 2025, nearly a month after Gladinet released a patch for the flaw in version 16.7.10368.56560. It is worth noting that CVE-2025-12480 is the third flaw in Triofox to be actively exploited this year alone, after CVE-2025-30406 and CVE-2025-11371.

DFIR retainer service

According to the software’s release notes, “Initialization page protection added.” “After setting up Triofox, you will no longer be able to access these pages.”

Mandiant said the attacker used an unauthenticated access vulnerability to access the configuration page and run the setup process to create a new native administrator account, Cluster Admin. The newly created account was then used to conduct subsequent activities.

“To execute the code, the attacker logged in using a newly created administrator account. The attacker uploaded a malicious file and used built-in antivirus functionality to execute the file,” said security researchers Stallone D’Souza, Pravees DSouza, Bill Glynn, Kevin O’Flynn, and Yash Gupta.

“To configure antivirus functionality, users can specify any path for the antivirus of their choice. The file configured as the antivirus scanner location inherits the permissions of Triofox’s parent process account and runs in the context of the SYSTEM account.”

According to Mandiant, the attacker executed a malicious batch script (‘centre_report.bat’) by setting the antivirus engine’s path to point to the script. This script is designed to download the Zoho Unified Endpoint Management System (UEMS) installer from 84.200.80.[.]252 and use it to deploy remote access programs like Zoho Assist and AnyDesk to your hosts.

CIS build kit

The remote access provided by Zoho Assist was utilized to conduct reconnaissance and subsequently change the passwords of existing accounts and attempt to add them to the local administrator and ‘Domain Admins’ groups for privilege escalation.

As a way to evade detection, the attackers downloaded tools such as Plink and PuTTY and set up an encrypted tunnel over port 433 over SSH to a command and control (C2) server, with the ultimate goal of allowing incoming RDP traffic.

Although the ultimate purpose of the campaign is still unknown, Triofox users are encouraged to update to the latest version, audit their administrator accounts, and ensure that Triofox’s antivirus engine is not configured to run unauthorized scripts or binaries.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleKonni hacker turns Google’s Find Hub into remote data erasure weapon
Next Article Rad Power Bikes faces closure in January without new funding
user
  • Website

Related Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

This week’s science news: Anomalies inside Earth, the Artemis II leak and how psychedelics can help treat PTSD

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Benchmark raises $225 million in special funding to double Cerebras

AI startup founder says he plans a ‘March for Billionaires’ to protest California’s wealth tax

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.