BTC $88035.6337
ETH $3249.7719
SOL $212.0182
BNB $625.7404
DOGE $0.3811
XRP $0.7080
stETH $3242.1564
ADA $0.5716
TRX $0.1879
TON $5.4715
AVAX $34.0098
wstETH $3852.6153
WBTC $87813.8091
WETH $3280.1312
SUI $3.2183
LINK $13.9827
BCH $433.6969
UNI $8.9654
DOT $5.3295
LEO $7.4008
NEAR $5.3607
APT $12.3730
PEPE $0.0000
weETH $3420.0226
LTC $77.1351
DAI $0.9993
CRO $0.1761
BSC-USD $0.9991
TAO $569.2308
I***** $8.8310
FET $1.3808
RENDER $7.2150
CAKE $1.9585
KAS $0.1386
ETC $22.8438
WIF $3.2695
FDUSD $1.0008
WBT $21.8183
POL $0.4009
STX $2.0242
USDE $1.0022
XMR $151.5203
XLM $0.1349
AAVE $179.7038
OKB $45.1647
IMX $1.3469
FIL $4.2361
BTC $88035.6337
ETH $3249.7719
SOL $212.0182
BNB $625.7404
DOGE $0.3811
XRP $0.7080
stETH $3242.1564
ADA $0.5716
TRX $0.1879
TON $5.4715
AVAX $34.0098
wstETH $3852.6153
WBTC $87813.8091
WETH $3280.1312
SUI $3.2183
LINK $13.9827
BCH $433.6969
UNI $8.9654
DOT $5.3295
LEO $7.4008
NEAR $5.3607
APT $12.3730
PEPE $0.0000
weETH $3420.0226
LTC $77.1351
DAI $0.9993
CRO $0.1761
BSC-USD $0.9991
TAO $569.2308
I***** $8.8310
FET $1.3808
RENDER $7.2150
CAKE $1.9585
KAS $0.1386
ETC $22.8438
WIF $3.2695
FDUSD $1.0008
WBT $21.8183
POL $0.4009
STX $2.0242
USDE $1.0022
XMR $151.5203
XLM $0.1349
AAVE $179.7038
OKB $45.1647
IMX $1.3469
FIL $4.2361
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • China infiltrates Asian government systems in an escalating case of espionage

    You can now steal sensitive intelligence data using new tools.

    Elastic Security Labs researchers have identified a new backdoor called BLOODALCHEMY, which has been used in attacks against ASEAN member nations by Chinese cybercriminals. The backdoor is part of their REF5961 intrusion kit, targeting x86 systems. Despite its functionality, BLOODALCHEMY is considered an incomplete project with limited capabilities. The backdoor uses commands such as writing or overwriting the toolchain, executing a binary, deleting and shutting down, and gathering host data. To ensure persistence, the backdoor copies itself to a specific folder, which may be ProgramFiles, ProgramFiles(x86), Appdata, or LocalAppDataPrograms. BLOODALCHEMY is part of REF5961's larger toolkit for both ongoing and previous attacks. The discovery of malware samples in the earlier REF2924 intrusion kit supports suspicions that REF5961 operators have connections to China. The three new REF5961 malware families, EAGERBEE, RUDEBIRD, and DOWNTOWN, are believed to be state-sponsored cyber spies.

    Author reign3d
    Israeli hackers cause massive power failures in Iran
    Hamas on the web: who is helping in a cyber war?

    Comments 0

    Add comment