InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Hackers exploit Triofox flaw to install remote access tools via antivirus
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Hackers exploit Triofox flaw to install remote access tools via antivirus
Technology

Hackers exploit Triofox flaw to install remote access tools via antivirus

November 10, 2025 3 Min Read
Share
Hackers exploit Triofox flaw to install remote access tools via antivirus
SHARE

Google’s Mandiant Threat Defense announced Monday that it has discovered an n-day exploit of a now-patched security flaw in Gladinet’s Triofox file sharing and remote access platform.

Tracked as a critical vulnerability CVE-2025-12480 (CVSS Score: 9.1) Allows an attacker to bypass authentication and access the configuration page, which may allow arbitrary payloads to be uploaded and executed.

The technology giant said it observed a threat cluster tracked as UNC6485 weaponizing the flaw as far back as August 24, 2025, nearly a month after Gladinet released a patch for the flaw in version 16.7.10368.56560. It is worth noting that CVE-2025-12480 is the third flaw in Triofox to be actively exploited this year alone, after CVE-2025-30406 and CVE-2025-11371.

According to the software’s release notes, “Initialization page protection added.” “After setting up Triofox, you will no longer be able to access these pages.”

Mandiant said the attacker used an unauthenticated access vulnerability to access the configuration page and run the setup process to create a new native administrator account, Cluster Admin. The newly created account was then used to conduct subsequent activities.

“To execute the code, the attacker logged in using a newly created administrator account. The attacker uploaded a malicious file and used built-in antivirus functionality to execute the file,” said security researchers Stallone D’Souza, Pravees DSouza, Bill Glynn, Kevin O’Flynn, and Yash Gupta.

“To configure antivirus functionality, users can specify any path for the antivirus of their choice. The file configured as the antivirus scanner location inherits the permissions of Triofox’s parent process account and runs in the context of the SYSTEM account.”

According to Mandiant, the attacker executed a malicious batch script (‘centre_report.bat’) by setting the antivirus engine’s path to point to the script. This script is designed to download the Zoho Unified Endpoint Management System (UEMS) installer from 84.200.80(.)252 and use it to deploy remote access programs like Zoho Assist and AnyDesk to the host.

The remote access provided by Zoho Assist was utilized to conduct reconnaissance and subsequently change the passwords of existing accounts and attempt to add them to the local administrator and ‘Domain Admins’ groups for privilege escalation.

See also  Evolution of UTA0388 espionage malware

As a way to evade detection, the attackers downloaded tools such as Plink and PuTTY and set up an encrypted tunnel over port 433 over SSH to a command and control (C2) server, with the ultimate goal of allowing incoming RDP traffic.

Although the ultimate purpose of the campaign is still unknown, Triofox users are encouraged to update to the latest version, audit their administrator accounts, and ensure that Triofox’s antivirus engine is not configured to run unauthorized scripts or binaries.

Share This Article
Twitter Copy Link
Previous Article Before Requiem, get the amazing Resident Evil 4 remake at the lowest price ever Before Requiem, get the amazing Resident Evil 4 remake at the lowest price ever
Next Article Hollywood TV writer who became a relentless citizen watchdog dies at 63 Hollywood TV writer who became a relentless citizen watchdog dies at 63

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Microsoft discovers 'whisper leak' attack that identifies AI chat topics in encrypted traffic
Technology

Microsoft discovers ‘whisper leak’ attack that identifies AI chat topics in encrypted traffic

7 Min Read
Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Technology

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

2 Min Read
SonicWall Urges Password Resets
Technology

SonicWall prompts password reset after a cloud backup violation affecting less than 5% of customers

4 Min Read
Malicious VSX extension 'SleepyDuck' uses Ethereum to keep command server alive
Technology

Malicious VSX extension ‘SleepyDuck’ uses Ethereum to keep command server alive

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?