Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

10 Things Event Agents Didn’t Know What You Can Do for Your Brand

APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks
Identity

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

userBy userMay 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 30, 2025Ravi LakshmananVulnerability/Threat Intelligence

China-related threat actors behind recent wild exploitation in SAP NetWeaver have been attributed to a broader set of attacks targeting organizations in Brazil, India and Southeast Asia since 2023.

“Threat actors are primarily targeted at accessing the target organization’s SQL servers by targeting SQL injection vulnerabilities discovered in web applications,” said Joseph C Chen of Trend Micro Security Researcher in an analysis published this week. “The actors are also leveraging a variety of known vulnerabilities to leverage public servers.”

Other prominent targets of hostile groups include Indonesia, Malaysia, the Philippines, Thailand and Vietnam.

The cybersecurity company tracks its activities under Earth Lamia in Moniker, saying that the activities share some degree of overlap with the threat cluster documented by the Elastic Security Lab, STAC6451 by Sophos and the CL-STA-0048 by Palo Alto Networks Unit 42.

Cybersecurity

Each of these attacks targets organizations across multiple sectors in South Asia, often leveraging Microsoft SQL servers and other instances exposed to the internet to conduct reconnaissance, deploying post-extracted tools such as Cobalt Strike and Supershell, and using Laksasa and Stowway to establish proxy tunnels in the victim network.

Privileged escalation tools such as Godpotato and Juicypotato are also used. Network scanning utilities such as FSCAN and KSCAN. Legitimate programs like Wevtutil.exe clean Windows applications, systems, and security event logs.

The selected intrusion targeting Indian entities attempted to deploy Mimic Ransomware binaries to encrypt the victim files, but the efforts were largely unsuccessful.

“I saw actors stage the binaries of mimic ransomware in all observed cases, but ransomware often didn’t run properly, and in some instances the actors were trying to remove the binaries after deployment,” Sophos said in an analysis released in August 2024.

Then, earlier this month, EclecticiQ revealed that CL-STA-0048 is one of many Chinese and Nexus cyberspy groups that exploit CVE-2025-31324.

In addition to CVE-2025-31324, the hacking crew is said to have weaponized eight different vulnerabilities to violate public-facing servers –

Describing “very active,” Trend Micro noted that threat actors have shifted their focus from financial services to logistics and online retail and, more recently, to IT companies, universities and government organizations.

Cybersecurity

“We observed at the beginning and before 2024 that most of their goals were organizations within the financial industry, particularly related to securities and intermediaries,” the company said. “In late 2024, they shifted their goals to organizations primarily in the logistics and online retail industry. Recently, they noticed that Target has moved again to IT companies, universities and government organizations.”

A notable technique adopted by Earth Lamia is launching custom backdoors like PulsePack via DLL sideloads. This is a widely accepted approach among Chinese hacking groups. PulsePack, a modular .NET-based implant, communicates with remote servers to retrieve various plugins and perform functions.

Trend Micro said in March 2025 that it observed an updated version of the backdoor that changes command and control (C2) communication methods from TCP to WebSocket, indicating the aggressive ongoing development of malware.

“Earth Lamia is active in business in multiple countries and industries with a positive intention,” he concluded. “At the same time, threat actors will continuously improve their offensive tactics by developing custom hacking tools and new backdoors.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGraphene oxide material can replace PFA in food packaging
Next Article ExperienceIt arrives in Manchester – Meeting News
user
  • Website

Related Posts

APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

June 2, 2025

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

June 2, 2025

Fake recruiters email target CFOs using legal netbird tools in six global regions

June 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

10 Things Event Agents Didn’t Know What You Can Do for Your Brand

APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

Defra announces electronic ID systems to modernize cow traceability

Trending Posts

Burundi people struggle in endless floods of Lake Tanganyika | Photo News

June 2, 2025

Russia and Ukraine trade fires as they head to Istanbul Peace Meeting | News of the Russian-Ukraine War

June 2, 2025

Lower turnout as Mexico votes in a controversial judicial election | Election news

June 2, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Primexbt expands its global reach with FSCA-regulated crypto assets services

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.