BTC $104432.4748
ETH $2514.4288
XRP $2.1677
BNB $656.0892
SOL $154.8015
DOGE $0.1903
ADA $0.6784
TRX $0.2673
stETH $2512.5315
WBTC $104300.2239
SUI $3.2659
HYPE $32.5690
wstETH $3028.1655
LINK $13.8469
USDS $1.0002
AVAX $20.6952
XLM $0.2657
BCH $409.1874
LEO $8.6737
TON $3.1602
HBAR $0.1673
WETH $2514.3924
LTC $87.0767
weETH $2686.8235
DOT $4.0678
XMR $324.3561
BSC-USD $1.0004
BGB $4.6984
BTCB $104563.6042
WBT $31.1442
USDE $1.0010
PEPE $0.0000
PI $0.6449
TAO $430.4742
AAVE $241.2370
UNI $5.9718
DAI $0.9993
sUSDe $1.1750
CRO $0.1029
OKB $50.1016
APT $4.7284
NEAR $2.4140
CBBTC $104434.2564
ICP $4.8984
ONDO $0.8252
ETC $16.8778
GT $19.3793
BTC $104432.4748
ETH $2514.4288
XRP $2.1677
BNB $656.0892
SOL $154.8015
DOGE $0.1903
ADA $0.6784
TRX $0.2673
stETH $2512.5315
WBTC $104300.2239
SUI $3.2659
HYPE $32.5690
wstETH $3028.1655
LINK $13.8469
USDS $1.0002
AVAX $20.6952
XLM $0.2657
BCH $409.1874
LEO $8.6737
TON $3.1602
HBAR $0.1673
WETH $2514.3924
LTC $87.0767
weETH $2686.8235
DOT $4.0678
XMR $324.3561
BSC-USD $1.0004
BGB $4.6984
BTCB $104563.6042
WBT $31.1442
USDE $1.0010
PEPE $0.0000
PI $0.6449
TAO $430.4742
AAVE $241.2370
UNI $5.9718
DAI $0.9993
sUSDe $1.1750
CRO $0.1029
OKB $50.1016
APT $4.7284
NEAR $2.4140
CBBTC $104434.2564
ICP $4.8984
ONDO $0.8252
ETC $16.8778
GT $19.3793
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment