Saturday, April 19, 2025

XE Group Expands Cybercrime Operations, Exploiting Zero-Day Vulnerabilities in VeraCore

A cybercriminal group with a long history of credit card skimming has evolved into a more sophisticated threat, targeting supply chain organizations in manufacturing and distribution. The XE Group, a Vietnamese-linked threat actor, has recently exploited two zero-day vulnerabilities in VeraCore’s warehouse management software, marking a shift in its attack methods.

From Credit Card Skimming to Supply Chain Attacks

For years, XE Group operated in the shadows, primarily skimming credit card data from e-commerce sites. But its latest move shows an evolution in strategy. Researchers from Intezer and Solis say the group is now exploiting critical software vulnerabilities, allowing them to gain deeper access into supply chain networks.

“XE Group’s evolution from credit card skimming operations to exploiting zero-day vulnerabilities underscores their adaptability and growing sophistication,” the researchers noted in a recent report.

Originally surfacing in 2013, XE Group was known for leveraging web vulnerabilities to inject malicious scripts into online payment systems. Over the past decade, security firms including Malwarebytes, Volexity, and Menlo Security have tracked the group’s activities. By 2023, it had expanded into setting up fake phishing sites, stealing personal data, and selling it in underground markets.

This latest shift toward software supply chain attacks raises new concerns. Instead of targeting individual victims, XE Group now infiltrates widely used platforms, compromising entire distribution networks.

cybersecurity hacker laptop screen dark background

Zero-Day Exploits in VeraCore

The group’s recent attacks focus on two newly discovered vulnerabilities in VeraCore:

  • CVE-2024-57968: A severe upload validation flaw (CVSS score of 9.9) that allows attackers to upload and execute malicious files.
  • CVE-2025-25181: A SQL injection vulnerability (CVSS score of 5.8) that can be used to manipulate databases and extract sensitive information.

By exploiting these vulnerabilities, XE Group has managed to install custom ASPX Web shells—small backdoor programs that give them continuous remote access. In one case, researchers found evidence that the group had been inside a compromised system since January 2020, reactivating a Web shell four years later.

Such persistence signals a methodical, long-term approach. Unlike ransomware groups that quickly demand payments, XE Group appears to favor prolonged, undetected access.

XE Group’s Expanding Toolkit

This latest campaign reflects XE Group’s growing expertise. Instead of relying on just one attack method, they now use a mix of strategies:

  • JavaScript Injection: Malicious scripts embedded in webpages to steal user data.
  • Exploitation of Web Vulnerabilities: Attacking widely used software products to gain a foothold in supply chains.
  • Custom Web Shells: Allowing long-term remote access to compromised systems.

According to a report from Menlo Security, XE Group was already experimenting with supply chain attacks in 2023. But the recent VeraCore exploits indicate a deeper shift—targeting business infrastructure instead of just consumer data.

The Bigger Picture: Supply Chain Cybersecurity at Risk

XE Group’s activities fit a broader pattern of cybercriminals exploiting software supply chains. Some of the most high-profile breaches in recent years follow a similar approach:

Attack Target Method Used Impact
SolarWinds (2020) Compromised software update Affected 18,000 organizations, including US government agencies
Progress MOVEit (2023) Exploited file transfer vulnerability Exposed sensitive data from multiple businesses
Okta (2023) Breached customer support system Affected all Okta customers
Accellion (2021) File-sharing vulnerability Led to ransomware attacks on corporate clients

XE Group is now playing in the same league. By focusing on software used in manufacturing and distribution, they maximize their impact, potentially affecting thousands of businesses that rely on VeraCore’s platform.

What’s Next for XE Group?

Given their track record, XE Group is unlikely to stop here. Their ability to remain undetected for years suggests they will continue refining their tactics. Security researchers warn that similar groups may follow suit, exploiting vulnerabilities in widely used business software.

For organizations in manufacturing and distribution, this is a wake-up call. Software vulnerabilities aren’t just an IT issue—they are now a major business risk.

Harper Jones
Harper Jones
Harper is an experienced content writer specializing in technology with expertise in simplifying complex technical concepts into easily understandable language. He has written for prestigious publications and online platforms, providing expert analysis on the latest technology trends, making his writing popular amongst readers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

Underground Rave Scene in China: A Pulse of Rebellion and Freedom

Crouching through a small metal door into a dark...

Luke Humphries Weight Loss Journey with Before & After Image

Luke Humphries, the British professional darts player, has recently...

How to Check Your MTN Number: A Beginner’s Tutorial

Checking your MTN number can be a lifesaver when...

Is Pure Flix Free With Amazon Prime? All You Need to Know

Pure Flix is a popular faith-based streaming service offering...