Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Posted on November 10, 2025November 10, 2025 By CWS

Nov 10, 2025Ravie LakshmananVulnerability / Incident Response
Google’s Mandiant Risk Protection on Monday mentioned it found n-day exploitation of a now-patched safety flaw in Gladinet’s Triofox file-sharing and distant entry platform.
The important vulnerability, tracked as CVE-2025-12480 (CVSS rating: 9.1), permits an attacker to bypass authentication and entry the configuration pages, ensuing within the add and execution of arbitrary payloads.
The tech big mentioned it noticed a menace cluster tracked as UNC6485 weaponizing the flaw way back to August 24, 2025, practically a month after Gladinet launched patches for the flaw in model 16.7.10368.56560. It is value noting that CVE-2025-12480 is the third flaw in Triofox that has come underneath lively exploitation this yr alone, after CVE-2025-30406 and CVE-2025-11371.

“Added safety for the preliminary configuration pages,” in keeping with launch notes for the software program. “These pages can not be accessed after Triofox has been arrange.”
Mandiant mentioned the menace actor weaponized the unauthenticated entry vulnerability to realize entry to the configuration pages, after which used them to create a brand new native admin account, Cluster Admin, by operating the setup course of. The newly created account was subsequently used to conduct follow-on actions.

“To attain code execution, the attacker logged in utilizing the newly created Admin account. The attacker uploaded malicious information to execute them utilizing the built-in antivirus function,” safety researchers Stallone D’Souza, Praveeth DSouza, Invoice Glynn, Kevin O’Flynn, and Yash Gupta mentioned.
“To arrange the antivirus function, the person is allowed to offer an arbitrary path for the chosen anti-virus. The file configured because the antivirus scanner location inherits the Triofox guardian course of account privileges, operating underneath the context of the SYSTEM account.”

The attackers, per Mandiant, ran their malicious batch script (“centre_report.bat”) by configuring the trail of the antivirus engine to level to the script. The script is designed to obtain an installer for Zoho Unified Endpoint Administration System (UEMS) from 84.200.80[.]252, and use it to deploy distant entry applications like Zoho Help and AnyDesk on the host.

The distant entry afforded by Zoho Help was leveraged to conduct reconnaissance, adopted by makes an attempt to vary passwords for current accounts and add them to native directors and the “Area Admins” group for privilege escalation.
As a technique to sidestep detection, the menace actors downloaded instruments like Plink and PuTTY to arrange an encrypted tunnel to a command-and-control (C2) server over port 433 through SSH with the final word objective of permitting inbound RDP site visitors.
Whereas the final word goal of the marketing campaign stays unknown, it is suggested that Triofox customers replace to the newest model, audit admin accounts, and confirm that Triofox’s antivirus engine isn’t configured to execute unauthorized scripts or binaries.

The Hacker News Tags:Access, Antivirus, Exploiting, Feature, Flaw, Hackers, Install, Remote, Tools, TrioFox

Post navigation

Previous Post: Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

Related Posts

Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics The Hacker News
6 Steps to 24/7 In-House SOC Success The Hacker News
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services The Hacker News
CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
  • Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
  • Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO
  • Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
  • Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
  • Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO
  • Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case
  • APT Groups Attacking Construction Industry Networks to Steal RDP, SSH and Citrix Logins

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News