BTC $103354.5528
ETH $2606.7338
XRP $2.5486
BNB $651.5963
SOL $176.4263
DOGE $0.2325
ADA $0.7984
TRX $0.2744
stETH $2604.1667
WBTC $103301.0649
SUI $3.9112
LINK $16.9941
wstETH $3133.2179
AVAX $24.9387
XLM $0.3034
USDS $0.9972
HBAR $0.2059
HYPE $25.1771
LEO $8.8762
TON $3.2423
BCH $402.3469
DOT $4.9744
LTC $100.8143
WETH $2603.6907
PI $0.8975
XMR $339.5057
weETH $2781.4488
PEPE $0.0000
BGB $4.7445
BTCB $103509.6329
BSC-USD $1.0007
CHEEL $5.1975
USDE $0.9987
WBT $30.3206
TAO $454.9621
UNI $6.5954
NEAR $3.0476
APT $5.7250
AAVE $229.2856
CBBTC $103403.9176
OKB $54.3944
DAI $0.9985
ONDO $1.0080
KAS $0.1206
ETC $19.8566
ICP $5.6317
CRO $0.1015
BTC $103354.5528
ETH $2606.7338
XRP $2.5486
BNB $651.5963
SOL $176.4263
DOGE $0.2325
ADA $0.7984
TRX $0.2744
stETH $2604.1667
WBTC $103301.0649
SUI $3.9112
LINK $16.9941
wstETH $3133.2179
AVAX $24.9387
XLM $0.3034
USDS $0.9972
HBAR $0.2059
HYPE $25.1771
LEO $8.8762
TON $3.2423
BCH $402.3469
DOT $4.9744
LTC $100.8143
WETH $2603.6907
PI $0.8975
XMR $339.5057
weETH $2781.4488
PEPE $0.0000
BGB $4.7445
BTCB $103509.6329
BSC-USD $1.0007
CHEEL $5.1975
USDE $0.9987
WBT $30.3206
TAO $454.9621
UNI $6.5954
NEAR $3.0476
APT $5.7250
AAVE $229.2856
CBBTC $103403.9176
OKB $54.3944
DAI $0.9985
ONDO $1.0080
KAS $0.1206
ETC $19.8566
ICP $5.6317
CRO $0.1015
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment