Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan
Identity

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

userBy userMay 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 14, 2025Ravi LakshmananRansomware/Vulnerability

Bianlian and Ransomexx exploit SAP NetWeaver flaws

At least two different cybercrime groups Bianlian and Ransomexx are said to have exploited the security flaws recently disclosed in SAP NetWeaver, indicating that multiple threat actors are exploiting the bug.

Cybersecurity company ReliaQuest said in a new update released today, it revealed evidence suggesting involvement from Vial’s data fear tor crew and the Ransomexx ransomware family.

Bianlian is rated as involved in at least one incident based on infrastructure links to IP addresses previously identified as attributed to the E-Crime group.

Cybersecurity

“Identified the server at 184[.]174[.]96[.]74 hosting reverse proxy services started by the RS64.exe executable, the company said. “This server is related to another IP, 184.[.]174[.]96[.]70, operated by the same hosting provider. The second IP was previously flagged as the Command and Control (C2) server associated with Bianlian.

ReliaQuest also observed a recent development of Pipemagic called plugin-based Trojan in connection with the use of zero-days in the Pablosing Escalation Bug (CVE-2025-29824).

The attack included the delivery of Pipemagic by using a web shell following the exploitation of SAP NetWeaver’s flaws.

“The initial attempt failed, but subsequent attacks involved the deployment of the Blue Tratel C2 framework using the execution of an inline MSBUILD task,” ReliaQuest said. “Dllhost.exe process was generated during this activity, indicating the exploitation of a CLFS vulnerability (CVE-2025-29824), which was previously exploited.

The findings come the day after eclecticiq revealed that multiple Chinese hacking groups tracked as UNC5221, UNC5174 and CL-STA-0048 were actively exploiting CVE-2025-31324 to drop various malicious payloads.

Cybersecurity

SAP security company Onapsis has revealed that threat actors have been exploiting CVE-2025-31324 since March 2025 along with the lasialization flaws in the same component (CVE-2025-42999).

“There is little actual difference between CVE-2025-31324 and CVE-2025-42999 as long as CVE-2025-31324 can be used for exploitation,” he said in a statement shared with Hacker News.

“CVE-2025-42999 indicates that higher privileges are required, while CVE-2025-31324 provides full system access. Threat actors can leverage vulnerabilities in both unauthenticated, unauthorized users in the same way.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump’s Oil’s preferred price is $40-50 based on his social media post
Next Article Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit
user
  • Website

Related Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

July 20, 2025

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

July 20, 2025

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

July 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Encrypthub targets Web3 developers using fake AI platforms to deploy Fickle Stealer malware

Tesla loses its appeal to Indian loyalists – even if the masks finally deliver

Important unpaid SharePoint Zero-Day will be actively utilized and violated global organizations over the age of 75

Malware injected into 6 npm package after maintainer token was stolen in a phishing attack

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.