Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Prince Andrew’s advisor encouraged Jeffrey Epstein to invest in EV startups like Lucid Motors

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

Reddit says it’s considering further acquisitions in ad tech and other areas

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » ShadowPad malware actively exploits WSUS vulnerabilities to gain system-wide access
Identity

ShadowPad malware actively exploits WSUS vulnerabilities to gain system-wide access

userBy userNovember 24, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 24, 2025Ravi LakshmananMalware/vulnerabilities

WSUS Vulnerability ShadowPad Malware

A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) was exploited by threat actors to distribute malware known as ShadowPad.

“The attackers targeted Windows servers with WSUS enabled and exploited CVE-2025-59287 for initial access,” the AhnLab Security Intelligence Center (ASEC) said in a report released last week. “They then used PowerCat, an open source PowerShell-based Netcat utility, to obtain a system shell (CMD). They then used certutil and curl to download and install ShadowPad.”

ShadowPad, considered a successor to PlugX, is a modular backdoor widely used by Chinese state-sponsored hacking groups. This virus first appeared in 2015. In an analysis published in August 2021, SentinelOne called it a “masterpiece of privately sold malware in Chinese espionage operations.”

DFIR retainer service

CVE-2025-59287, which Microsoft addressed last month, refers to a critical flaw in WSUS deserialization that can be exploited to achieve remote code execution with system privileges. This vulnerability has since become more frequently exploited, with attackers using it to gain initial access to exposed WSUS instances, perform reconnaissance, and even drop legitimate tools such as Velociraptor.

CVE-2025-59287 ShadowPad installed via exploit

In an attack documented by a South Korean cybersecurity firm, an attacker was found to use this vulnerability to launch Windows utilities such as ‘curl.exe’ and ‘certutil.exe’ to connect to an external server (‘149.28.78’).[.]189:42306″) to download and install ShadowPad.

Similar to PlugX, ShadowPad is launched via DLL sideloading, utilizing a legitimate binary (‘ETDCtrlHelper.exe’) to execute a DLL payload (‘ETDApix.dll’). It acts as a memory-resident loader that executes the backdoor.

CIS build kit

Once installed, the malware is designed to launch a core module that loads other plugins embedded in the shellcode into memory. It also includes various anti-detection and persistence techniques.

“After the proof-of-concept (PoC) exploit code for this vulnerability was published, attackers quickly weaponized it and distributed ShadowPad malware via WSUS servers,” AhnLab said. “This vulnerability is significant because it allows remote code execution with system-level privileges, significantly increasing the potential impact.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHistory of Science: Iconic ‘Lucy’ Fossil Discovered Changes Our Understanding of Human Evolution — November 24, 1974
Next Article Addressing key challenges in the UK’s materials and mining sectors
user
  • Website

Related Posts

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026

CISA orders removal of unsupported edge devices to reduce risk to federal networks

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Prince Andrew’s advisor encouraged Jeffrey Epstein to invest in EV startups like Lucid Motors

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

Reddit says it’s considering further acquisitions in ad tech and other areas

Here’s how Roblox’s age check works

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.