Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Posted on November 10, 2025November 10, 2025 By CWS

Nov 10, 2025Ravie LakshmananVulnerability / Incident Response
Google’s Mandiant Risk Protection on Monday mentioned it found n-day exploitation of a now-patched safety flaw in Gladinet’s Triofox file-sharing and distant entry platform.
The important vulnerability, tracked as CVE-2025-12480 (CVSS rating: 9.1), permits an attacker to bypass authentication and entry the configuration pages, ensuing within the add and execution of arbitrary payloads.
The tech big mentioned it noticed a menace cluster tracked as UNC6485 weaponizing the flaw way back to August 24, 2025, practically a month after Gladinet launched patches for the flaw in model 16.7.10368.56560. It is value noting that CVE-2025-12480 is the third flaw in Triofox that has come underneath lively exploitation this yr alone, after CVE-2025-30406 and CVE-2025-11371.

“Added safety for the preliminary configuration pages,” in keeping with launch notes for the software program. “These pages can not be accessed after Triofox has been arrange.”
Mandiant mentioned the menace actor weaponized the unauthenticated entry vulnerability to realize entry to the configuration pages, after which used them to create a brand new native admin account, Cluster Admin, by operating the setup course of. The newly created account was subsequently used to conduct follow-on actions.

“To attain code execution, the attacker logged in utilizing the newly created Admin account. The attacker uploaded malicious information to execute them utilizing the built-in antivirus function,” safety researchers Stallone D’Souza, Praveeth DSouza, Invoice Glynn, Kevin O’Flynn, and Yash Gupta mentioned.
“To arrange the antivirus function, the person is allowed to offer an arbitrary path for the chosen anti-virus. The file configured because the antivirus scanner location inherits the Triofox guardian course of account privileges, operating underneath the context of the SYSTEM account.”

The attackers, per Mandiant, ran their malicious batch script (“centre_report.bat”) by configuring the trail of the antivirus engine to level to the script. The script is designed to obtain an installer for Zoho Unified Endpoint Administration System (UEMS) from 84.200.80[.]252, and use it to deploy distant entry applications like Zoho Help and AnyDesk on the host.

The distant entry afforded by Zoho Help was leveraged to conduct reconnaissance, adopted by makes an attempt to vary passwords for current accounts and add them to native directors and the “Area Admins” group for privilege escalation.
As a technique to sidestep detection, the menace actors downloaded instruments like Plink and PuTTY to arrange an encrypted tunnel to a command-and-control (C2) server over port 433 through SSH with the final word objective of permitting inbound RDP site visitors.
Whereas the final word goal of the marketing campaign stays unknown, it is suggested that Triofox customers replace to the newest model, audit admin accounts, and confirm that Triofox’s antivirus engine isn’t configured to execute unauthorized scripts or binaries.

The Hacker News Tags:Access, Antivirus, Exploiting, Feature, Flaw, Hackers, Install, Remote, Tools, TrioFox

Post navigation

Previous Post: Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
Next Post: Threat Actors Leverage RMM Tools to Deploy Medusa & DragonForce Ransomware

Related Posts

F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion The Hacker News
Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit The Hacker News
SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws The Hacker News
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback The Hacker News
DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams The Hacker News
China-Linked APT41 Hackers Target U.S. Trade Officials Amid 2025 Negotiations The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records
  • MongoDB Servers at Critical Risk
  • Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability
  • 87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online
  • Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Claim Breach of WIRED Database Containing 2.3 million Subscriber Records
  • MongoDB Servers at Critical Risk
  • Ubisoft Rainbow Six Siege Servers Breach linked to MongoBleed Vulnerability
  • 87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online
  • Mongobleed PoC Exploit Tool Released for MongoDB Flaw that Exposes Sensitive Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark