XE Group Expands from Card Skimming to Supply Chain Cyber Attacks

Article Highlights
Off On

Cybercrime has taken a new turn as XE Group, historically known for stealing credit card information, has now ventured into supply chain attacks. The transformation of cyber threats witnessed with XE Group underlines their adaptive capabilities and serves as a stark reminder of the need for fortified cybersecurity in an increasingly interconnected digital landscape.

From E-commerce Exploits to Supply Chain Sabotage

Initial Card Skimming Tactics

Traditionally, the XE Group has honed its expertise in exploiting web vulnerabilities, particularly targeting e-commerce platforms. These tactics allowed them to skim credit card data, causing widespread financial losses for both consumers and businesses alike. The group’s proficiency in identifying and exploiting web vulnerabilities meant that they often went unnoticed, a factor that significantly added to their dangerous reputation. As online shopping grew rapidly, this threat evolved correspondingly, with cybercriminals becoming increasingly sophisticated.

This focus on credit card skimming was emblematic of a broader trend within cybercrime towards attacking financial resources directly. By embedding malicious code in unsuspecting e-commerce sites, XE Group managed to siphon off valuable data from innumerable transactions. These stolen data troves were then monetized, impacting countless users. However, the evolution of cybersecurity defenses meant that solely relying on these tactics would not suffice. The group recognized the need to innovate, pushing their operations into more diverse and high-stakes arenas.

Transition to Supply Chain Attacks

Recognizing the limitations of card skimming, XE Group has shifted its focus towards supply chain attacks, specifically targeting the manufacturing and distribution sectors. This marks a significant escalation in their operations, as it involves leveraging complex zero-day vulnerabilities in widely-used software. The supply chain sector, with its myriad of interconnected systems and third-party services, presents abundant opportunities for cyberattacks. Such attacks often have far-reaching consequences, affecting numerous stakeholders and leading to systemic disruptions.

A case in point is their recent exploitation of vulnerabilities within VeraCore’s warehouse management platform. Two zero-day flaws were identified and exploited: an upload validation vulnerability (CVE-2024-57968) with a high CVSS severity score of 9.9, and a SQL injection flaw (CVE-2025-25181) with a moderate severity score of 5.8. These flaws were ingeniously used to deploy malicious web shells, granting XE Group sustained access to compromised systems. This shift not only underscores their technical prowess but also highlights the broader trend of cybercriminals targeting software supply chains to maximize impact.

Persistent Exploitation Efforts

Long-term Cyberattack Campaigns

Researchers at Intezer and Solis have noted XE Group’s methodical and long-term commitment to their cyberattack strategies. Originating from Vietnam, the group has demonstrated a remarkable ability to maintain persistence and evade detection over extended periods. This persistence is a critical factor that differentiates them from many other cybercriminal entities. Their ability to reestablish control over compromised systems even after long dormancy periods is particularly concerning for cybersecurity professionals.

One notable example of this persistence involves their exploitation of a VeraCore warehouse management software vulnerability starting from January 2020. XE Group managed to keep this exploitation under wraps for several years, only reactivating their web shell in 2024. This long game approach implies careful planning and an in-depth understanding of targeted systems. Such extended campaigns make it harder for victims to cleanse their systems thoroughly, as the dormant malware can be reactivated, circumventing temporary security measures and posing ongoing risks.

Implications for Cybersecurity

The transition of XE Group from e-commerce-specific attacks to broader supply chain cyberassaults signifies a need for reevaluated security strategies. It is evident that traditional methodologies are no longer sufficient. This shift aligns with a larger trend in the cybersecurity space, with heightened focus on protecting software supply chains. High-profile incidents such as the SolarWinds breach and the Progress Software MOVEit file transfer tool attack underscore the critical vulnerabilities present in interconnected systems.

Security experts have raised alarms, emphasizing the urgency for adopting comprehensive and resilient cybersecurity frameworks. The XE Group’s ability to adapt and innovate reflects a sophisticated understanding of systemic weaknesses within industry practices. Their strategies indicate more than just opportunistic breaches but point towards calculated efforts to exploit vulnerabilities for maximum disruption. This demands more vigilant and proactive defense mechanisms, ranging from stricter software audits to enhanced real-time monitoring of third-party integrations.

Industry-Wide Threat Awareness

Broader Cybercriminal Trends

XE Group’s new tactics are part of a broader trend among cybercriminals targeting software supply chains to create widespread disruptions. This approach exploits the interconnected nature of modern business operations where the compromise of a single component can cascade throughout an entire network. Examples of other notorious supply chain attacks include breaches involving Okta and Accellion, which not only impacted direct users but also extended to their clients and partners, multiplying the overall damage.

The supply chain attacks demonstrate the vulnerabilities inherent within widely-adopted software systems. By compromising these critical links, cybercriminals can efficiently propagate their attacks, causing extensive harm. Awareness among industry stakeholders regarding these sophisticated methods is crucial for mitigating future risks. Enhancing collaborative defenses and sharing intelligence about such threats can go a long way in strengthening the overall cybersecurity posture against similar incidents.

Need for Vigilance and Proactive Measures

Cybercrime has evolved significantly, and a clear example is the notorious XE Group. Historically infamous for pilfering credit card information, this cybercriminal organization has now expanded its scope to include supply chain attacks. This shift in their modus operandi highlights their ability to adapt and underscores a growing threat landscape. The evolution of cyber threats, as evidenced by XE Group’s changing strategies, serves as a stark reminder of the ever-present need for enhanced cybersecurity measures. In our increasingly connected digital world, organizations must remain vigilant and proactive in defending against such adaptive and persistent threats. This transformation within XE Group emphasizes the critical importance of maintaining robust cybersecurity frameworks to protect invaluable data and systems. With cybercriminals continuously refining their tactics, the demand for fortified defenses and innovative cybersecurity protocols becomes more crucial than ever. The ongoing battle against such advanced cyber threats calls for a vigilant and adaptive approach to safeguarding our digital environments.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the