VeraCore Zero-Day Exploits: XE Group’s Cybercrime Evolution or Just a Midlife Crisis?
The XE Group has moved from credit card theft to exploiting zero-day exploits in VeraCore, targeting supply chain organizations. This Vietnamese threat actor’s cunning tactics include leveraging vulnerabilities and maintaining long-term system access, proving that when it comes to cybercrime, they’re not just skimming the surface anymore.

Hot Take:
Who knew credit card skimming was just the gateway drug for cybercriminals? The XE Group has traded in their plastic obsession for a VIP ticket to the supply chain attack gala. Watch out VeraCore, there’s a new zero-day sheriff in town, and they’re not just here for the credit.
Key Points:
- XE Group, a cybercrime gang linked to Vietnam, has evolved from credit card skimming to targeting supply chains in manufacturing and distribution sectors.
- The group exploited two zero-day vulnerabilities in VeraCore’s warehouse management platform to install malicious Web shells.
- XE Group has been tracked by vendors like Malwarebytes and Menlo Security since 2013, initially focusing on credit card data theft from e-commerce sites.
- Recent attacks show XE Group maintaining long-term access to compromised systems, even reactivating old Web shells.
- The group’s shift reflects a broader trend of cybercriminals targeting supply chain vulnerabilities.
Already a member? Log in here