Sunday, December 7, 2025

Title: Hackers Abuse Triofox Antivirus to Deploy Remote Access Tools

by Rachel Kim – Technology Editor

Hackers Exploited Triofox Antivirus to Secretly Install Remote access Tools

Security researchers have ‌discovered a⁣ campaign where hackers abused a feature within Triofox antivirus⁣ software to bypass ‍security measures ⁤and deploy remote access tools on ⁣compromised systems. The vulnerability, a zero-day local file⁣ inclusion flaw‍ (CVE-2025-11371) affecting ⁤both Gladinet CentreStack and Triofox products, allowed⁤ attackers to access ​system files without‌ authentication, leading ‌to ⁣at ‍least three successful network intrusions.

This exploitation ⁢highlights a ‍critical ​risk: even robust security software ⁤can be subverted if its own internal mechanisms are compromised. The attackers leveraged Triofox’s ⁣antivirus⁤ engine​ to run unauthorized scripts and binaries, effectively turning‌ a security tool into a gateway for malicious ​activity. ​Organizations using triofox, notably those‍ relying ⁤on⁢ it as a primary line of defense, are urged to immediately update ‌to the latest ‌version and audit ⁢admin accounts⁣ to mitigate the threat.

The⁣ vulnerability​ was initially reported​ by Huntress last month and afterward addressed in Triofox version​ 16.7.10368.56560. However, the‌ most recent update, version 16.10.10408.56683, released on October 14, contains a complete fix and is ⁤strongly recommended by Triofox for all‍ users.

GTIG’s report details indicators of compromise (IoCs) to assist security ⁤teams in identifying and responding to⁢ potential attacks. These IoCs‍ are also available⁤ on VirusTotal.beyond updating, ⁣Triofox ⁣advises administrators to verify the antivirus engine isn’t ‍configured to execute unauthorized code, a key element in⁣ preventing future exploitation of this type.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.