BTC $102580.9415
ETH $2208.1012
XRP $2.2994
BNB $625.5003
SOL $161.6619
DOGE $0.1938
ADA $0.7566
TRX $0.2549
stETH $2203.9203
WBTC $102657.0404
SUI $3.8356
LINK $15.7039
wstETH $2651.7185
AVAX $22.1007
XLM $0.2916
USDS $1.0035
LEO $8.8676
HBAR $0.1934
BCH $416.1148
TON $3.1919
HYPE $23.6386
LTC $95.0121
DOT $4.4807
WETH $2208.5736
XMR $298.6271
BTCB $102584.8066
BGB $4.4964
BSC-USD $1.0018
weETH $2355.7954
USDE $1.0024
PEPE $0.0000
PI $0.6703
WBT $30.3015
TAO $420.8530
UNI $6.1883
APT $5.5626
NEAR $2.7537
CBBTC $102607.4037
DAI $1.0016
OKB $52.6487
AAVE $205.1001
ONDO $0.9761
CRO $0.0989
ETC $18.4859
ICP $5.2103
TRUMP $13.7943
GT $21.7876
BTC $102580.9415
ETH $2208.1012
XRP $2.2994
BNB $625.5003
SOL $161.6619
DOGE $0.1938
ADA $0.7566
TRX $0.2549
stETH $2203.9203
WBTC $102657.0404
SUI $3.8356
LINK $15.7039
wstETH $2651.7185
AVAX $22.1007
XLM $0.2916
USDS $1.0035
LEO $8.8676
HBAR $0.1934
BCH $416.1148
TON $3.1919
HYPE $23.6386
LTC $95.0121
DOT $4.4807
WETH $2208.5736
XMR $298.6271
BTCB $102584.8066
BGB $4.4964
BSC-USD $1.0018
weETH $2355.7954
USDE $1.0024
PEPE $0.0000
PI $0.6703
WBT $30.3015
TAO $420.8530
UNI $6.1883
APT $5.5626
NEAR $2.7537
CBBTC $102607.4037
DAI $1.0016
OKB $52.6487
AAVE $205.1001
ONDO $0.9761
CRO $0.0989
ETC $18.4859
ICP $5.2103
TRUMP $13.7943
GT $21.7876
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment