Key Takeaways
An n-day unauthorized access vulnerability in the Gladinet Triofox secure file-sharing and collaboration platform is being actively exploited, chained with the abuse of the software's integrated antivirus (AV) scanning feature to achieve remote code execution (RCE).Â
This now-patched Triofox vulnerability, tracked as CVE-2025-12480, allows unauthenticated attackers to upload a malicious file that, when processed by the legitimate AV engine, triggers a payload delivery mechanism.
GTIG observed a threat cluster tracked as UNC6485 exploiting the unauthenticated access flaw together with the abuse of the built-in AV for RCE as early as August 2025.
The core of this attack lies in manipulating the AV scanner integrated into Triofox. Attackers craft a specific file that, upon being scanned, initiates the download and execution of a secondary payload from a remote server, a Google Threat Intelligence Group (GTIG) report said.
This method represents a creative form of AV feature abuse, as it circumvents typical file upload restrictions and security checks.Â
Once the initial payload is executed, the attackers proceed to deploy a legitimate copy of the Zoho Unified Endpoint Management System (UEMS) software installer and well-known remote access tools such as Zoho Assist and AnyDesk.
These tools are leveraged to:
This grants them persistent access to the compromised server, enabling further malicious activities.
This flaw, which affects Triofox version 16.4.10317.56372, highlights critical cybersecurity risks for organizations using the platform. Administrators of Triofox instances are urged to immediately apply the vendor's security patches to remediate the vulnerability, which is resolved in new versions of Triofox.
This incident serves as a crucial reminder that even security-focused features can be weaponized if not properly implemented and hardened against manipulation. Organizations should prioritize timely patching and continuous monitoring to defend against such evolving threats.
Mandiant recommends that organizations:
Earlier this month, Windows GDI flaws exposed systems to RCE and data leaks. In September, a MostereRAT phishing campaign leveraged AnyDesk and TightVNC to target Windows systems.