BTC $104129.0414
ETH $2498.1402
XRP $2.1450
BNB $650.9960
SOL $152.1416
DOGE $0.1896
TRX $0.2684
ADA $0.6640
stETH $2494.7555
WBTC $103991.8272
SUI $3.2565
HYPE $31.8407
wstETH $3003.5249
LINK $13.8174
USDS $1.0008
AVAX $20.4159
XLM $0.2642
BCH $402.5534
LEO $8.6506
TON $3.1196
HBAR $0.1663
WETH $2497.6223
LTC $86.7753
weETH $2669.4102
DOT $4.0236
XMR $327.1014
BSC-USD $1.0004
BGB $4.6631
BTCB $104118.6998
WBT $31.0200
USDE $1.0013
PEPE $0.0000
PI $0.6317
AAVE $240.3437
TAO $418.0704
UNI $6.1816
DAI $0.9996
sUSDe $1.1745
CRO $0.1026
OKB $49.8707
APT $4.6926
NEAR $2.3931
CBBTC $104128.0146
ICP $4.8727
ONDO $0.8199
ETC $16.8052
GT $19.1885
BTC $104129.0414
ETH $2498.1402
XRP $2.1450
BNB $650.9960
SOL $152.1416
DOGE $0.1896
TRX $0.2684
ADA $0.6640
stETH $2494.7555
WBTC $103991.8272
SUI $3.2565
HYPE $31.8407
wstETH $3003.5249
LINK $13.8174
USDS $1.0008
AVAX $20.4159
XLM $0.2642
BCH $402.5534
LEO $8.6506
TON $3.1196
HBAR $0.1663
WETH $2497.6223
LTC $86.7753
weETH $2669.4102
DOT $4.0236
XMR $327.1014
BSC-USD $1.0004
BGB $4.6631
BTCB $104118.6998
WBT $31.0200
USDE $1.0013
PEPE $0.0000
PI $0.6317
AAVE $240.3437
TAO $418.0704
UNI $6.1816
DAI $0.9996
sUSDe $1.1745
CRO $0.1026
OKB $49.8707
APT $4.6926
NEAR $2.3931
CBBTC $104128.0146
ICP $4.8727
ONDO $0.8199
ETC $16.8052
GT $19.1885
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment