Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Triofox Flaw Lets Hackers Install Remote

November 11, 2025
Reading Time: 3 mins read
in Alerts
Delayed Payloads Hit Nuget Packages

Google’s Mandiant Threat Defense on Monday reported the discovery of active exploitation targeting a fixed security vulnerability in Gladinet’s Triofox file-sharing and remote access software. This flaw, designated as CVE-2025-12480 and carrying a critical CVSS score of 9.1, permitted an attacker to circumvent authentication protocols and gain access to the platform’s configuration pages.

This unauthorized access was then leveraged to upload and execute malicious payloads, representing a severe security breach.The technology giant noted that a specific threat cluster, identified as UNC6485, had been observed actively weaponizing this vulnerability since August 24, 2025. Critically, this activity began almost a month after Gladinet made patches available in version 16.7.10368.56560. The vulnerability’s re-emergence is part of a pattern, as CVE-2025-12480 is the third Triofox flaw to be actively exploited this year, following CVE-2025-30406 and CVE-2025-11371.

The patch itself focused on hardening the initial configuration pages, with release notes stating, “These pages can no longer be accessed after Triofox has been set up.”Mandiant’s analysis details that the threat actors exploited the unauthenticated access vulnerability to reach the configuration pages, subsequently running the setup process to create a new, native administrative account named “Cluster Admin.”

This newly created, high-privilege account was then used to facilitate follow-on malicious activities. To achieve code execution, the attackers logged in with the new Admin account and uploaded malicious files, which were then executed using Triofox’s built-in antivirus feature. Security researchers explained that because the antivirus setup allows a user to provide an arbitrary path for the scanner location, the configured file inherits the Triofox parent process privileges, which run under the highly sensitive SYSTEM account.According to Mandiant, the attackers took advantage of this mechanism by configuring the antivirus engine path to point to a malicious batch script named “centre_report.bat.”

This script was designed to connect to an external IP address (84.200.80$$.$$252) and download an installer for Zoho Unified Endpoint Management System (UEMS). The ultimate goal of this deployment was to install remote access programs, specifically Zoho Assist and AnyDesk, onto the compromised host.The remote access capabilities provided by Zoho Assist were then utilized by the threat actors to conduct internal reconnaissance. This was followed by attempts to elevate their privileges by changing the passwords of existing accounts and adding these accounts to both local administrator groups and the powerful “Domain Admins” group.

Furthermore, to evade detection and maintain persistence, the attackers downloaded legitimate tools like Plink and PuTTY to establish an encrypted SSH tunnel to a command-and-control (C2) server over port 433, with the final objective of allowing seamless inbound Remote Desktop Protocol (RDP) traffic. While the precise motive behind the overall campaign remains unclear, Triofox users are strongly urged to update to the latest version, thoroughly audit all administrator accounts, and verify that the platform’s antivirus feature is not configured to execute any unauthorized scripts or binaries.

Reference:

  • Hackers Exploit Triofox Flaw To Install Remote Access Tools Via Antivirus
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial