XE Group Changes Strategy: From Credit Card Skimming to Supply Chain Hacking


Posted on: 02 Mar 2025 | Author: Foresiet
header

Introduction

Cyber hackers always find ways to make their strategies more perfect in countermanding the security measures, and the XE Group is no exception. Hailing from Vietnam, initially famous for its credit card skimming operations, the cyber threat entity now engages itself in supply chain hacking. This sophistication and flexibility are proved by exploiting two newly identified zero-day vulnerabilities in VeraCore's warehouse management software. In this aspect, it poses serious risks to organizations within the manufacturing and distribution sector that have compromised data tracking and digital footprint analysis as an integral component of security.

XE Group Supply Chain Attacks

For years, security researchers have been tracking XE Group, the primary cybercrime actor, mainly in the context of attacks on e-commerce sites. The new exploits, however, point out a very obvious shift towards more general systemic attacks on the software supply chain.

Recently, Intezer and Solis jointly published a report stating that XE Group exploited two major vulnerabilities in VeraCore's warehouse management platform.

  • CVE-2024-57968: In the CVSS, this had a rating of 9.9, making it possible to upload Web shells by an attacker
  • CVE-2025-25181: SQL injection-This is scored at 5.8 and allows a database attacker to log in without their permission

The exploits introduce the capability for XE Group to inject malicious JavaScript into web pages, which could allow them to persist for quite a long period in compromised environments. Brand impersonation defense evasion allows the attackers to bypass one of the means of detection.

Long-term Impacts of the Activities of XE Group

Researchers have discovered that the XE Group has enjoyed uninterrupted access at least in some of its victim environments since January 2020, which implies that it might lay dormant for years.

This is also part of a wider trend in cybercrime, whereby hackers transition from quick hits to sustained breaches to affect more extended impacts.

This group's tactics change constantly in line with other cybercrime trends that include attacks on the software supply chain. These include:

  • SolarWinds breach: Global hack involving thousands of organizations
  • MOVEit file transfer attacks: Serious security breaches affecting companies in various parts of the globe
  • Okta and Accellion breaches: Attackers exploiting vulnerabilities to drain sensitive data

As supply chain hacking moves up the sophistication ladder, the need for dark web monitoring services, identification of compromised accounts, and digital threat scoring will be high to prevent the potential impact.

What It Means for Business

This is a wake-up call for businesses that include third-party software and their supply chains by XE Group. It means, first, that organizations must:

  • Implement Periodic Security Updates: Any kind of software, be it a warehouse management tool like VeraCore, will have to periodically receive the latest security patches.
  • Improve on Digital Footprint Analysis: Any external connection will have to be monitored and filtered for potential vulnerabilities.
  • Implement Dark Web Monitoring: Use brand protection and stolen credential identification capabilities to spot exposed data that will eventually be used.
  • Use Online Risk Assessments: Ask for an AI-powered cybersecurity solution that can bring back real–time threat intelligence.

Conclusion

In truth, the XE Group experienced a real cyber threat landscape shift because it put an end to the theft of credit cards and provided cyberattacks as new types of cyber fraud. Indeed, their style of exploiting some vulnerability and benefiting from long-term access to critical systems really needs proper cyber security measures. If the emerging ones are to be anticipated, then the business shall look forward to more proactive and proactive defense schemes like dark web monitoring, brand identity theft defense mechanism, and scores on digital threat analysis.

As such cybercrime continues to evolve, vigilance, along with proper investment in sophisticated security measures, will be very fundamental to protecting digital assets and ensuring business continuity.


About us!

Foresiet is the pioneering force in digital security solutions, offering the first integrated Digital Risk Protection SaaS platform. With 24x7x365 dark web monitoring and proactive threat intelligence, Foresiet safeguards against data breaches and intellectual property theft. Our robust suite includes brand protection, takedown services, and supply chain assessment, enhancing your organization's defense mechanisms. Attack surface management is a key component of our approach, ensuring comprehensive protection across all vulnerable points. Compliance is assured through adherence to ISO27001, NIST, GDPR, PCI, SOX, HIPAA, SAMA, CITC, and Third Party regulations. Additionally, our advanced antiphishing shield provides unparalleled protection against malicious emails. Trust Foresiet to empower your organization to navigate the digital landscape securely and confidently.

Safeguard Your Reputation, Data, and Systems

Protect your brand, reputation, data, and systems with Foresiet's Integrated Digital Risk Platform. 24/7/365 threat monitoring for total peace of mind.

dashboard