BTC $67127.2142
ETH $2619.1802
BNB $594.3660
SOL $154.3326
XRP $0.5428
stETH $2616.7393
DOGE $0.1165
TRX $0.1592
ADA $0.3557
TON $5.2161
AVAX $27.7169
wstETH $3095.6463
WBTC $67033.3346
WETH $2620.4840
UNI $7.9576
LINK $11.3054
BCH $361.8337
DOT $4.3285
SUI $1.9955
LTC $71.8317
DAI $0.9997
APT $10.2616
TAO $628.8161
weETH $2750.7528
PEPE $0.0000
BSC-USD $0.9986
FET $1.4643
ICP $8.0288
CAKE $1.8650
KAS $0.1337
FDUSD $0.9989
IMX $1.5703
NEAR $4.9976
ETC $19.4947
RENDER $5.5304
XMR $154.8701
POL $0.3704
STX $1.8350
WIF $2.6104
OKB $41.3570
WBT $16.4967
USDE $0.9997
BABYDOGE $0.0000
AAVE $155.9280
FIL $3.7778
HBAR $0.0562
INJ $21.1015
BTC $67127.2142
ETH $2619.1802
BNB $594.3660
SOL $154.3326
XRP $0.5428
stETH $2616.7393
DOGE $0.1165
TRX $0.1592
ADA $0.3557
TON $5.2161
AVAX $27.7169
wstETH $3095.6463
WBTC $67033.3346
WETH $2620.4840
UNI $7.9576
LINK $11.3054
BCH $361.8337
DOT $4.3285
SUI $1.9955
LTC $71.8317
DAI $0.9997
APT $10.2616
TAO $628.8161
weETH $2750.7528
PEPE $0.0000
BSC-USD $0.9986
FET $1.4643
ICP $8.0288
CAKE $1.8650
KAS $0.1337
FDUSD $0.9989
IMX $1.5703
NEAR $4.9976
ETC $19.4947
RENDER $5.5304
XMR $154.8701
POL $0.3704
STX $1.8350
WIF $2.6104
OKB $41.3570
WBT $16.4967
USDE $0.9997
BABYDOGE $0.0000
AAVE $155.9280
FIL $3.7778
HBAR $0.0562
INJ $21.1015
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment