Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: XE Group Shifts Tactics to Zero-Day Exploits
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

XE Group Shifts Tactics to Zero-Day Exploits

Highlights

  • XE Group moved from credit-card skimming to zero-day vulnerabilities.

  • Their focus now includes global supply chains in manufacturing sectors.

  • Vulnerabilities in VeraCore remain partially unpatched.

Samantha Reed
Last updated: 3 February, 2025 - 4:10 pm 4:10 pm
Samantha Reed 3 months ago
Share
SHARE

XE Group, a cybercriminal organization with over ten years of activity, has significantly altered its operational methods. Transitioning from credit-card skimming, they now exploit previously unknown software vulnerabilities, heightening risks across global supply chains. This strategic shift underscores the evolving nature of cyber threats targeting critical sectors such as manufacturing and distribution.

Contents
What are XE Group’s Current Tactics?How has XE Group’s Targeting Evolved?Which Vulnerabilities is XE Group Exploiting?

Earlier investigations identified XE Group in 2013 as a threat to e-commerce platforms through credit-card fraud. Their persistent activity over the years reveals a pattern of adapting to new vulnerabilities, such as those in widely used tools like Telerik UI for ASP.NET, and expanding their attack vectors, reflecting their ability to stay ahead of cybersecurity measures.

What are XE Group’s Current Tactics?

XE Group now leverages zero-day vulnerabilities in VeraCore, a supply chain management tool, allowing them to infiltrate systems and steal sensitive information. Their use of sophisticated malware like Meterpreter and PowerShell-based payloads enables long-term system access and covert communication channels.

“These recent discoveries highlight that XE Group is not only active but evolving,” the blog reads. “The group’s ability to exploit unknown vulnerabilities and sustain prolonged access to targeted systems reflects a significant shift in their operational strategy.”

How has XE Group’s Targeting Evolved?

Initially targeting e-commerce platforms with credit-card skimmers, the group has redirected its focus towards industries reliant on supply chain management software. This broader targeting increases their potential impact on global supply chains, particularly within manufacturing and distribution sectors.

Which Vulnerabilities is XE Group Exploiting?

The organization exploited an upload validation flaw and a SQL injection flaw in VeraCore, granting unauthorized system access and enabling data exfiltration. While a temporary fix for the upload validation flaw has been implemented by VeraCore’s parent company, Adavantive, the SQL flaw remains unpatched.

An Intezer representative stated that CVEs for the vulnerabilities will be released shortly after final validation from MITRE.

Research indicates that XE Group’s infrastructure comprises domains for command-and-control and hosting skimming tools, including customized variants of open-source webshells like ASPXSpy. The group’s ability to maintain access to compromised systems over extended periods, exemplified by the reactivation of a webshell planted in 2020, demonstrates their commitment to long-term system infiltration and intelligence gathering.

XE Group’s historical association with Vietnam, suggested by linked email addresses and pseudonyms like “XeThanh,” indicates a well-resourced operation with minimal efforts to obscure its identity. This lack of secrecy implies that XE Group is unlikely to be state-aligned, as state-sponsored groups typically employ stricter operational security measures.

XE Group’s evolution in tactics presents significant challenges for cybersecurity professionals, emphasizing the need for proactive vulnerability management and continuous monitoring of supply chain management systems. Organizations should prioritize patching known vulnerabilities and adopt advanced threat detection mechanisms to mitigate the risks posed by such persistent and resourceful cybercriminal entities.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

SonicWall Customers Face Spike in Device Vulnerabilities

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Apple Set to Launch New Watch Model in September 2025
Next Article Nvidia RTX 5090 Demand Exceeds Supply, Stock Shortages Persist

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

FTC Delays Enforcement of Subscription Cancellation Rule
Gaming
Master Your Wordle Strategy with Expert Tips
Gaming
Giant Bomb Returns to Independent Roots After Staff Acquisition
Gaming
Nintendo Gives Itself Power to Disable Consoles
Gaming
Standard Bots Unveils Robot Arm and Expands U.S. Facility
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?