{"id":3405,"date":"2025-02-10T07:12:45","date_gmt":"2025-02-10T07:12:45","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/02\/10\/xe-hacker-group-exploits-veracore-zero-day-to-deploy-persistent-web-shells\/"},"modified":"2025-02-10T07:12:45","modified_gmt":"2025-02-10T07:12:45","slug":"xe-hacker-group-exploits-veracore-zero-day-to-deploy-persistent-web-shells","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/02\/10\/xe-hacker-group-exploits-veracore-zero-day-to-deploy-persistent-web-shells\/","title":{"rendered":"XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells"},"content":{"rendered":"<p>\u200bThreat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems.<br \/>\nThe zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE Group, a cybercrime\u00a0Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems.<br \/>\nThe zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE Group, a cybercrime\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThreat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems. The zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/02\/10\/xe-hacker-group-exploits-veracore-zero-day-to-deploy-persistent-web-shells\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":3406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3405"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=3405"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/3405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/3406"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=3405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=3405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=3405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}