Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Triofox Flaw Lets Hackers Install Remote

November 11, 2025
Reading Time: 3 mins read
in Alerts
Delayed Payloads Hit Nuget Packages

Google’s Mandiant Threat Defense on Monday reported the discovery of active exploitation targeting a fixed security vulnerability in Gladinet’s Triofox file-sharing and remote access software. This flaw, designated as CVE-2025-12480 and carrying a critical CVSS score of 9.1, permitted an attacker to circumvent authentication protocols and gain access to the platform’s configuration pages.

This unauthorized access was then leveraged to upload and execute malicious payloads, representing a severe security breach.The technology giant noted that a specific threat cluster, identified as UNC6485, had been observed actively weaponizing this vulnerability since August 24, 2025. Critically, this activity began almost a month after Gladinet made patches available in version 16.7.10368.56560. The vulnerability’s re-emergence is part of a pattern, as CVE-2025-12480 is the third Triofox flaw to be actively exploited this year, following CVE-2025-30406 and CVE-2025-11371.

The patch itself focused on hardening the initial configuration pages, with release notes stating, “These pages can no longer be accessed after Triofox has been set up.”Mandiant’s analysis details that the threat actors exploited the unauthenticated access vulnerability to reach the configuration pages, subsequently running the setup process to create a new, native administrative account named “Cluster Admin.”

This newly created, high-privilege account was then used to facilitate follow-on malicious activities. To achieve code execution, the attackers logged in with the new Admin account and uploaded malicious files, which were then executed using Triofox’s built-in antivirus feature. Security researchers explained that because the antivirus setup allows a user to provide an arbitrary path for the scanner location, the configured file inherits the Triofox parent process privileges, which run under the highly sensitive SYSTEM account.According to Mandiant, the attackers took advantage of this mechanism by configuring the antivirus engine path to point to a malicious batch script named “centre_report.bat.”

This script was designed to connect to an external IP address (84.200.80$$.$$252) and download an installer for Zoho Unified Endpoint Management System (UEMS). The ultimate goal of this deployment was to install remote access programs, specifically Zoho Assist and AnyDesk, onto the compromised host.The remote access capabilities provided by Zoho Assist were then utilized by the threat actors to conduct internal reconnaissance. This was followed by attempts to elevate their privileges by changing the passwords of existing accounts and adding these accounts to both local administrator groups and the powerful “Domain Admins” group.

Furthermore, to evade detection and maintain persistence, the attackers downloaded legitimate tools like Plink and PuTTY to establish an encrypted SSH tunnel to a command-and-control (C2) server over port 433, with the final objective of allowing seamless inbound Remote Desktop Protocol (RDP) traffic. While the precise motive behind the overall campaign remains unclear, Triofox users are strongly urged to update to the latest version, thoroughly audit all administrator accounts, and verify that the platform’s antivirus feature is not configured to execute any unauthorized scripts or binaries.

Reference:

  • Hackers Exploit Triofox Flaw To Install Remote Access Tools Via Antivirus
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Delayed Payloads Hit Nuget Packages

Glassworm Found In Three VS Code Addons

November 11, 2025
Delayed Payloads Hit Nuget Packages

Delayed Payloads Hit Nuget Packages

November 11, 2025
Lost iPhone Beware Fake Text Claims

Samsung Flaw Used To Install Landfall

November 10, 2025
Lost iPhone Beware Fake Text Claims

ClickFix Phishing Targets Hotel Systems

November 10, 2025
Lost iPhone Beware Fake Text Claims

Lost iPhone Beware Fake Text Claims

November 10, 2025
Gootloader Returns With New Tricks

Malicious VS Code Extension Found

November 7, 2025

Latest Alerts

Glassworm Found In Three VS Code Addons

Triofox Flaw Lets Hackers Install Remote

Delayed Payloads Hit Nuget Packages

Samsung Flaw Used To Install Landfall

ClickFix Phishing Targets Hotel Systems

Lost iPhone Beware Fake Text Claims

Subscribe to our newsletter

    Latest Incidents

    Italian Adviser Targeted By Paragon Spyware

    Manassas Schools Close After Cyberattack

    Chinese Breach Exposes Cyber Weapons

    Oracle EBS Hack Hits Nearly 30 Victims

    China Hackers Target US Nonprofit

    Hackers Steal Sonicwall Cloud Backups

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial