Exploitation Toolsets Against Chinese Infrastructure
We assess with high confidence that the threat actor Xorcat recently published a suite of five exploitation tools targeting Chinese network infrastructure. The toolset bypasses authentication, extracts personally identifiable information, and maps financial associations. Analysts verify that the scripts exploit missing rate limits, static tokens, and insecure direct object references. Unmasking exact citizen identities remains…
Read More “Exploitation Toolsets Against Chinese Infrastructure” »

You must be logged in to post a comment.