BTC $103254.2470
ETH $2605.1531
XRP $2.5630
BNB $652.1789
SOL $177.1781
DOGE $0.2343
ADA $0.8011
TRX $0.2763
stETH $2602.4861
WBTC $103188.4603
SUI $3.9255
LINK $17.0342
wstETH $3132.4624
AVAX $25.2697
XLM $0.3048
HBAR $0.2074
USDS $0.9990
HYPE $25.0980
TON $3.2672
LEO $8.8029
BCH $403.7755
DOT $5.0139
LTC $100.1312
WETH $2605.8237
PI $0.9091
XMR $341.5468
weETH $2780.6744
PEPE $0.0000
BGB $4.7253
BTCB $103371.0020
BSC-USD $0.9977
CHEEL $5.2345
USDE $0.9995
WBT $30.3029
TAO $453.9634
UNI $6.6039
NEAR $3.0657
APT $5.7911
AAVE $229.0656
ONDO $1.0326
DAI $1.0000
CBBTC $103314.3745
OKB $53.9892
KAS $0.1208
ICP $5.6750
ETC $19.8593
CRO $0.1024
BTC $103254.2470
ETH $2605.1531
XRP $2.5630
BNB $652.1789
SOL $177.1781
DOGE $0.2343
ADA $0.8011
TRX $0.2763
stETH $2602.4861
WBTC $103188.4603
SUI $3.9255
LINK $17.0342
wstETH $3132.4624
AVAX $25.2697
XLM $0.3048
HBAR $0.2074
USDS $0.9990
HYPE $25.0980
TON $3.2672
LEO $8.8029
BCH $403.7755
DOT $5.0139
LTC $100.1312
WETH $2605.8237
PI $0.9091
XMR $341.5468
weETH $2780.6744
PEPE $0.0000
BGB $4.7253
BTCB $103371.0020
BSC-USD $0.9977
CHEEL $5.2345
USDE $0.9995
WBT $30.3029
TAO $453.9634
UNI $6.6039
NEAR $3.0657
APT $5.7911
AAVE $229.0656
ONDO $1.0326
DAI $1.0000
CBBTC $103314.3745
OKB $53.9892
KAS $0.1208
ICP $5.6750
ETC $19.8593
CRO $0.1024
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment