XE Group’s New Cybercrime Playbook: From Card Skimming to Zero-Day Exploits!
Malware hunters reveal the Vietnamese XE Group has evolved from credit card skimming to exploiting two zero-day vulnerabilities in VeraCore, targeting the fulfillment industry. This shift underscores a move towards information theft and supply chain attacks. Researchers are collaborating with vendors to address these vulnerabilities.

Hot Take:
Looks like the XE Group is feeling a little zero-day-sy. They’ve upgraded from pickpocketing credit cards to full-on cyber cat burglars, exploiting zero-day vulnerabilities like it’s a new hobby. Let’s hope they don’t start a podcast on it next!
Key Points:
- XE Group, a Vietnamese cybercrime gang, has shifted focus from credit card-skimming to exploiting zero-day vulnerabilities.
- The group targeted VeraCore, a software platform used by fulfillment companies and e-retailers.
- They exploited two zero-day vulnerabilities in VeraCore to gain unauthorized access.
- XE Group’s tactics now include deploying webshells and exfiltrating configuration files.
- Researchers from Intezer and Solis Security are collaborating with vendors, but CVE identifiers were only recently assigned.
Already a member? Log in here