A recently emerged toolset, dubbed TMChecker, has surfaced on the dark web, posing a significant threat to remote access services and popular e-commerce platforms. Developed by an actor known as "M762," TMChecker is priced at $200 per month and is accessible on the XSS cybercrime forum. It specifically targets corporate VPN gateways, email servers, content management systems, and hosting panels, as outlined in a report by Resecurity researchers. TMChecker aids threat actors in compromising corporate networks and gaining unauthorized access to sensitive data, contributing to the rising trend of human-operated attacks using compromised remote access tools observed by Microsoft since September 2022. TMChecker operates by combining login-checking capabilities with brute force attack methods, significantly lowering the entry barriers for novice threat actors. It primarily targets corporate remote access gateways, including VPN gateways from major vendors such as Cisco, Citrix, Pulse Secure, and FortiNet, along with remote desktop protocols and popular hosting panels like cPanel, DirectAdmin, and Plesk. This tool's subscription-based model, priced at $200 per month, facilitates its widespread adoption among cybercriminals, including those with limited financial resources. The implications of TMChecker extend to facilitating ransomware attacks and serving as a primary intrusion vector for cybercriminals aiming to infiltrate corporate networks. It actively targets various services, including VPNs, e-commerce platforms like OpenCart and Magento, popular CMSes such as Joomla and WordPress, and hosting panels like cPanel and Plesk. Notably, TMChecker has been employed in targeting the email server of a government organization in Ecuador, indicating its real-world impact. Despite the developers' claim of having 3,270 subscribers on their Telegram channel, the exact number of paying customers remains undisclosed, raising concerns about the tool's proliferation and potential for widespread exploitation.
A critical security issue has been identified in Google Cloud’s Vertex AI platform that allows low-privileged users to escalate privileges and compromise high-permission service ...
A set of critical vulnerabilities has been identified in CrewAI, a widely used platform for building multi-agent AI systems. These flaws expose environments to prompt injection att...
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...