Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Posted on November 10, 2025November 10, 2025 By CWS

Nov 10, 2025Ravie LakshmananVulnerability / Incident Response
Google’s Mandiant Risk Protection on Monday mentioned it found n-day exploitation of a now-patched safety flaw in Gladinet’s Triofox file-sharing and distant entry platform.
The important vulnerability, tracked as CVE-2025-12480 (CVSS rating: 9.1), permits an attacker to bypass authentication and entry the configuration pages, ensuing within the add and execution of arbitrary payloads.
The tech big mentioned it noticed a menace cluster tracked as UNC6485 weaponizing the flaw way back to August 24, 2025, practically a month after Gladinet launched patches for the flaw in model 16.7.10368.56560. It is value noting that CVE-2025-12480 is the third flaw in Triofox that has come underneath lively exploitation this yr alone, after CVE-2025-30406 and CVE-2025-11371.

“Added safety for the preliminary configuration pages,” in keeping with launch notes for the software program. “These pages can not be accessed after Triofox has been arrange.”
Mandiant mentioned the menace actor weaponized the unauthenticated entry vulnerability to realize entry to the configuration pages, after which used them to create a brand new native admin account, Cluster Admin, by operating the setup course of. The newly created account was subsequently used to conduct follow-on actions.

“To attain code execution, the attacker logged in utilizing the newly created Admin account. The attacker uploaded malicious information to execute them utilizing the built-in antivirus function,” safety researchers Stallone D’Souza, Praveeth DSouza, Invoice Glynn, Kevin O’Flynn, and Yash Gupta mentioned.
“To arrange the antivirus function, the person is allowed to offer an arbitrary path for the chosen anti-virus. The file configured because the antivirus scanner location inherits the Triofox guardian course of account privileges, operating underneath the context of the SYSTEM account.”

The attackers, per Mandiant, ran their malicious batch script (“centre_report.bat”) by configuring the trail of the antivirus engine to level to the script. The script is designed to obtain an installer for Zoho Unified Endpoint Administration System (UEMS) from 84.200.80[.]252, and use it to deploy distant entry applications like Zoho Help and AnyDesk on the host.

The distant entry afforded by Zoho Help was leveraged to conduct reconnaissance, adopted by makes an attempt to vary passwords for current accounts and add them to native directors and the “Area Admins” group for privilege escalation.
As a technique to sidestep detection, the menace actors downloaded instruments like Plink and PuTTY to arrange an encrypted tunnel to a command-and-control (C2) server over port 433 through SSH with the final word objective of permitting inbound RDP site visitors.
Whereas the final word goal of the marketing campaign stays unknown, it is suggested that Triofox customers replace to the newest model, audit admin accounts, and confirm that Triofox’s antivirus engine isn’t configured to execute unauthorized scripts or binaries.

The Hacker News Tags:Access, Antivirus, Exploiting, Feature, Flaw, Hackers, Install, Remote, Tools, TrioFox

Post navigation

Previous Post: Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
Next Post: Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware

Related Posts

MS Teams Hack, MFA Hijacking, B Crypto Heist, Apple Siri Probe & More MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More The Hacker News
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection The Hacker News
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files The Hacker News
CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024 CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024 The Hacker News
Cyber Threats Unveiled: Outlook Add-Ins and AI Malware Cyber Threats Unveiled: Outlook Add-Ins and AI Malware The Hacker News
Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark