Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

OpenAI’s AI Technology to Revolutionize Military Operations?

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

JPMorgan uses token JPMD, like Stablecoin, to move further into cipher

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Xe Hacker Group Explore Veracore Zero-Day and deploys a permanent web shell
Identity

Xe Hacker Group Explore Veracore Zero-Day and deploys a permanent web shell

userBy userFebruary 10, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

February 10, 2025Ravi LakshmananVulnerability/Malware

Veracore Zero-Day

Threat actors take advantage of multiple security flaws in various software products, including ASP.NET Ajax and Veracore’s Progress Telerik UI with benefits, drop reverse and web shells, and can be persistent to compromised systems. It has been observed that maintain remote access.

The zero-day exploitation of Veracore’s security flaws stems from a threat actor known as the XE Group, a cybercriminal group of Vietnamese origin that is known to have been active since at least 2010.

“The XE Group has shifted from credit card skimming to targeted information theft, showing a significant shift in operational priorities,” cybersecurity company Intezer in a report published in collaboration with Solis Security I’ve said that.

“Their attacks now target the supply chains of the manufacturing and distribution sectors, leveraging new vulnerabilities and advanced tactics.”

Cybersecurity

The vulnerabilities in question are listed below –

CVE-2024-57968 (CVSS score: 9.9) – Unlimited uploading of files with dangerous types of vulnerabilities that allow remote authenticated users to upload files to unintended folders (Veracode version 2024.4.2.1) CVE-2025 -25181 (CVSS score: 5.8) – SQL injection vulnerability that allows remote attackers to execute arbitrary SQL commands (patches are not exploited)

The latest findings from Intezer and Solis security show that drawbacks are chained to deploy the ASPXSPY web shell for unauthorized access to infected systems. 2024.

The Web Shell is equipped with the ability to enumerate file systems, remove files, and compress them using tools such as 7Z. Access is also abused to drop payloads of meter preparers that attempt to connect to the Actor Control Server (“222.253.102[.]94:7979”) via a Windows socket.

The updated variants of the web shell also incorporate a variety of features to facilitate network scans, command execution, and SQL queries, extract important information and modify existing data. It’s there.

Previous attacks installed by XE Group weaponized known vulnerabilities, but ASP.NET’s Telerik UI flaws (CVE-2017-9248 and CVE-2019-18935, CVSS score: 9.8) was the first time a hacking crew had made the mark. It shows an increase in sophistication due to zero-day exploitation.

“The ability to maintain persistent access to the system, as seen in webshell revitalization years after the initial deployment, underscores the group’s commitment to long-term goals.”

“By targeting the supply chains of the manufacturing and distribution sector, XE Group not only maximizes operational impact, it also demonstrates a keen understanding of systemic vulnerability.”

Flagged as one of the most exploited vulnerabilities by UK and US government agencies in 2021, CVE-2019-18935 loads last month’s reverse shell and runs follow-up reconnaissance commands via CMD This has also poses the recent aggressive exploitation. . EXE.

“The ongoing vulnerabilities in ASP.NET Ajax are a few years old, but they continue to be a viable entry point for threat actors,” says Esentire. “This underscores the importance of patching your system, especially when exposed to the Internet.”

CISA adds 5 defects to the KEV catalog

This development is because the US Cybersecurity and Infrastructure Security Agency (CISA) added five security flaws to its known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation.

CVE-2025-0411 (CVSS score: 7.0) – 7-zip mark vulnerability in web bypass CVE-2022-23748 (CVSS score: 7.8) – Dante Discovery Process Control Vulnerability CVE-2024-21413 (CVSS score: 9.8) – Microsoft Outlook Improper Input Verification Vulnerability CVE-2020-29574 (CVSS Score: 9.8) – Cybero Amos (CROS) SQL Injection Vulnerability CVE-2020-15069 (CVSS Score: 9.8) – Sophos XG Firewo L Buffer Overflow Vulnerability

Last week, Trend Micro revealed that Russian cybercrime costumes are leveraging CVE-2025-0411 to distribute smoker malware as part of a spear phishing campaign targeting Ukrainian entities .

Cybersecurity

Meanwhile, the exploitation of CVE-2020-29574 and CVE-2020-15069 is linked to the Chinese spy campaign that Sophos tracked under the Monica Pacific Rim.

Currently, there are no reports of CVE-2024-21413 being misused in the wild for CVE-2024-21413, which is currently being tracked as a moniker link per checkpoint. Regarding CVE-2022-23748, the cybersecurity company observed a Todisai threat actor in late 2022, taking advantage of the DLL sideload vulnerability in Audient Dante Discovery (“Mdnsresponder.exe”). has been revealed.

The Federal Private Enforcement Division (FCEB) agency is required to apply the necessary updates by February 27, 2025. This is based on Binding Operations Directive (BOD) 22-01 to prevent aggressive threats.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTake: Why was Puerto Rico the Bad Bunny anthem, where the global chords were hit by Puerto Rico? |News
Next Article Zimbra releases security updates for SQL injection, saves XSS, saves SSRF vulnerabilities
user
  • Website

Related Posts

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

June 17, 2025

A bug in Langsmith could expose Openai keys and user data via malicious agents

June 17, 2025

Silver Fox Apt targets Taiwan with complex GH0stringe and HoldingHands rat malware

June 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s AI Technology to Revolutionize Military Operations?

Google Chrome Zero-Day CVE-2025-2783 Taxoff exploits Trinper Backdoor

JPMorgan uses token JPMD, like Stablecoin, to move further into cipher

A $16 billion worth of lamps in a peter ties founder fund-led deal

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

OpenAI’s AI Technology to Revolutionize Military Operations?

Elon Musk’s AI startup Xai raises $4.3 billion in equity funding in addition to $5 billion in debt transactions during the surge in AI costs

Sword Health lands $40 million to expand AI care into mental health, valuing $4 billion

R0AR introduces a unified defi platform for tokens, liquidity and NFT staking

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.