BTC $104330.3707
ETH $2510.1520
XRP $2.1630
BNB $654.1283
SOL $154.5333
DOGE $0.1903
ADA $0.6737
TRX $0.2684
stETH $2506.6324
WBTC $104198.0763
SUI $3.2539
HYPE $32.4676
wstETH $3019.9422
LINK $13.8756
AVAX $20.6916
USDS $0.9971
XLM $0.2660
BCH $403.3624
LEO $8.6647
TON $3.1362
HBAR $0.1681
WETH $2509.6504
LTC $86.6251
weETH $2681.9653
DOT $4.0474
XMR $326.6821
BSC-USD $1.0009
BGB $4.6659
BTCB $104391.3173
WBT $31.1115
USDE $1.0009
PEPE $0.0000
PI $0.6362
TAO $427.1778
AAVE $241.5329
UNI $6.1813
DAI $1.0000
sUSDe $1.1713
CRO $0.1028
OKB $50.0234
APT $4.7432
NEAR $2.4095
CBBTC $104330.1318
ICP $4.9012
ONDO $0.8276
ETC $16.8752
GT $19.2728
BTC $104330.3707
ETH $2510.1520
XRP $2.1630
BNB $654.1283
SOL $154.5333
DOGE $0.1903
ADA $0.6737
TRX $0.2684
stETH $2506.6324
WBTC $104198.0763
SUI $3.2539
HYPE $32.4676
wstETH $3019.9422
LINK $13.8756
AVAX $20.6916
USDS $0.9971
XLM $0.2660
BCH $403.3624
LEO $8.6647
TON $3.1362
HBAR $0.1681
WETH $2509.6504
LTC $86.6251
weETH $2681.9653
DOT $4.0474
XMR $326.6821
BSC-USD $1.0009
BGB $4.6659
BTCB $104391.3173
WBT $31.1115
USDE $1.0009
PEPE $0.0000
PI $0.6362
TAO $427.1778
AAVE $241.5329
UNI $6.1813
DAI $1.0000
sUSDe $1.1713
CRO $0.1028
OKB $50.0234
APT $4.7432
NEAR $2.4095
CBBTC $104330.1318
ICP $4.9012
ONDO $0.8276
ETC $16.8752
GT $19.2728
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • A new cyber threat poses a data theft risk to Chinese government agencies

    Hackers employ a wide variety of techniques, tailoring each assault to the target.

    Critical infrastructure in China has been the target of an uptick in cyber attacks in recent months. The discovery of a new series of APT attacks by the Shuangyirat group was one of the most alarming phenomena discovered by the Fuying Lab team. Attackers have carried out complex cyberattacks over the past six months, displaying a high level of hacking expertise and the capacity to cause significant damage.

    Fuying Lab found that the cybercriminals had used specialized tools, which led them to the Double XOR Rat campaign. The name comes from the characteristic communication encryption method that uses double XOR encryption in the communication process.

    The main targets of Double XOR Rat were leading state-owned enterprises, research institutes and government agencies. This distinct group exploits security flaws to take command of a wide variety of public network nodes, and then conducts in-depth vulnerability scans of internal networks to assess the worth of each compromised target.

    Fuying Lab claims that the organization's attacks fall into one of three broad categories, each of which is designed to exploit a specific weakness in the targeted systems.

    The initial style of assault

    It relies on gaining initial access to the system by exploiting flaws in security devices that are reachable over the Internet. After gaining access to a system, the hackers can then download even more malicious code by activating a Python HTTP server on the compromised devices.

    The first type of attack is a reconnaissance operation, which is how experts define attacks that use NetBIOS scanning tools to locate Windows hosts on a network. NBTscan or Nextnet scanners are used to evaluate the potential of the target domain depending on the processor architecture of the target devices.

    The Second Form of Assault

    According to the description, the operation uses a Trojan that the group itself developed as a monitoring tool. Hacker-valuable devices are prioritized for activation of the method. Malware allows persistent two-way communication with a compromised system, giving attackers the ability to spy on and control infected devices.

    A third form of assault

    It's the most niche, and it's only deployed when the target domain also houses mail service infrastructure. After hackers gain access to a server, they can use it to send out phishing emails; when sent from a whitelisted server, these attacks are much more successful.

    Researchers say the Double XOR Rat campaign is still active, so businesses should take precautions like keeping up with software updates and training employees to recognize cyber threats.

    Author reign3d
    The hacker group Cyber Av3ngers says they broke into garbage treatment plants in ten cities
    Looney Tunables are being used by Kinsing hackers to steal credentials

    Comments 0

    Add comment