BTC $67153.1824
ETH $3518.8510
BNB $593.1423
SOL $173.6872
XRP $0.5942
DOGE $0.1343
TON $7.2606
ADA $0.4375
wstETH $4130.6503
TRX $0.1348
AVAX $29.1102
WBTC $67151.9777
WETH $3564.0428
DOT $6.3333
LINK $14.2614
BCH $395.7035
UNI $8.0161
LTC $73.0376
DAI $1.0021
MATIC $0.5415
PEPE $0.0000
ICP $10.3297
KAS $0.1811
BSC-USD $0.9979
NEAR $6.2869
FET $1.4598
CAKE $2.0600
ETC $23.9273
APT $7.3661
IMX $1.6421
XMR $163.1140
MNT $0.8986
STX $1.9118
RNDR $7.0054
FIL $4.7122
INJ $27.6326
HBAR $0.0747
ENS $26.4902
WIF $2.6389
MKR $2812.0726
OKB $42.9636
VET $0.0305
TAO $337.2354
ONDO $1.0919
AR $33.5407
ATOM $6.5235
SUI $0.8500
BTC $67153.1824
ETH $3518.8510
BNB $593.1423
SOL $173.6872
XRP $0.5942
DOGE $0.1343
TON $7.2606
ADA $0.4375
wstETH $4130.6503
TRX $0.1348
AVAX $29.1102
WBTC $67151.9777
WETH $3564.0428
DOT $6.3333
LINK $14.2614
BCH $395.7035
UNI $8.0161
LTC $73.0376
DAI $1.0021
MATIC $0.5415
PEPE $0.0000
ICP $10.3297
KAS $0.1811
BSC-USD $0.9979
NEAR $6.2869
FET $1.4598
CAKE $2.0600
ETC $23.9273
APT $7.3661
IMX $1.6421
XMR $163.1140
MNT $0.8986
STX $1.9118
RNDR $7.0054
FIL $4.7122
INJ $27.6326
HBAR $0.0747
ENS $26.4902
WIF $2.6389
MKR $2812.0726
OKB $42.9636
VET $0.0305
TAO $337.2354
ONDO $1.0919
AR $33.5407
ATOM $6.5235
SUI $0.8500
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment