Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Alternative app store AltStore PAL joins Fediverse

Driver in fatal Ford Blue Cruze crash was likely distracted before the collision

The world is being held hostage by its reliance on oil. How can we break free from the fossil fuel?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan
Identity

Bianlian and Ransomexx deploys SAP NetWeaver flaws and deploys Pipemagic Trojan

userBy userMay 14, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 14, 2025Ravi LakshmananRansomware/Vulnerability

Bianlian and Ransomexx exploit SAP NetWeaver flaws

At least two different cybercrime groups Bianlian and Ransomexx are said to have exploited the security flaws recently disclosed in SAP NetWeaver, indicating that multiple threat actors are exploiting the bug.

Cybersecurity company ReliaQuest said in a new update released today, it revealed evidence suggesting involvement from Vial’s data fear tor crew and the Ransomexx ransomware family.

Bianlian is rated as involved in at least one incident based on infrastructure links to IP addresses previously identified as attributed to the E-Crime group.

Cybersecurity

“Identified the server at 184[.]174[.]96[.]74 hosting reverse proxy services started by the RS64.exe executable, the company said. “This server is related to another IP, 184.[.]174[.]96[.]70, operated by the same hosting provider. The second IP was previously flagged as the Command and Control (C2) server associated with Bianlian.

ReliaQuest also observed a recent development of Pipemagic called plugin-based Trojan in connection with the use of zero-days in the Pablosing Escalation Bug (CVE-2025-29824).

The attack included the delivery of Pipemagic by using a web shell following the exploitation of SAP NetWeaver’s flaws.

“The initial attempt failed, but subsequent attacks involved the deployment of the Blue Tratel C2 framework using the execution of an inline MSBUILD task,” ReliaQuest said. “Dllhost.exe process was generated during this activity, indicating the exploitation of a CLFS vulnerability (CVE-2025-29824), which was previously exploited.

The findings come the day after eclecticiq revealed that multiple Chinese hacking groups tracked as UNC5221, UNC5174 and CL-STA-0048 were actively exploiting CVE-2025-31324 to drop various malicious payloads.

Cybersecurity

SAP security company Onapsis has revealed that threat actors have been exploiting CVE-2025-31324 since March 2025 along with the lasialization flaws in the same component (CVE-2025-42999).

“There is little actual difference between CVE-2025-31324 and CVE-2025-42999 as long as CVE-2025-31324 can be used for exploitation,” he said in a statement shared with Hacker News.

“CVE-2025-42999 indicates that higher privileges are required, while CVE-2025-31324 provides full system access. Threat actors can leverage vulnerabilities in both unauthenticated, unauthorized users in the same way.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTrump’s Oil’s preferred price is $40-50 based on his social media post
Next Article Samsung Patches CVE-2025-4632 Used for Mirai Botnet deployment via Magicinfo 9 Exploit
user
  • Website

Related Posts

Researchers trick Perplexity’s Comet AI browser into phishing scam in under 4 minutes

March 11, 2026

Critical flaw in n8n could allow remote code execution and disclosure of stored credentials

March 11, 2026

Meta disables 150,000 accounts linked to Southeast Asia fraud center in global crackdown

March 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Alternative app store AltStore PAL joins Fediverse

Driver in fatal Ford Blue Cruze crash was likely distracted before the collision

The world is being held hostage by its reliance on oil. How can we break free from the fossil fuel?

Researchers trick Perplexity’s Comet AI browser into phishing scam in under 4 minutes

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.