Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Microsoft Edge has become an AI browser with launching “Copilot Mode”

Humanity announces new rate limits to curb Claude Code Power users

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks
Identity

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

userBy userMay 30, 20251 Comment3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 30, 2025Ravi LakshmananVulnerability/Threat Intelligence

China-related threat actors behind recent wild exploitation in SAP NetWeaver have been attributed to a broader set of attacks targeting organizations in Brazil, India and Southeast Asia since 2023.

“Threat actors are primarily targeted at accessing the target organization’s SQL servers by targeting SQL injection vulnerabilities discovered in web applications,” said Joseph C Chen of Trend Micro Security Researcher in an analysis published this week. “The actors are also leveraging a variety of known vulnerabilities to leverage public servers.”

Other prominent targets of hostile groups include Indonesia, Malaysia, the Philippines, Thailand and Vietnam.

The cybersecurity company tracks its activities under Earth Lamia in Moniker, saying that the activities share some degree of overlap with the threat cluster documented by the Elastic Security Lab, STAC6451 by Sophos and the CL-STA-0048 by Palo Alto Networks Unit 42.

Cybersecurity

Each of these attacks targets organizations across multiple sectors in South Asia, often leveraging Microsoft SQL servers and other instances exposed to the internet to conduct reconnaissance, deploying post-extracted tools such as Cobalt Strike and Supershell, and using Laksasa and Stowway to establish proxy tunnels in the victim network.

Privileged escalation tools such as Godpotato and Juicypotato are also used. Network scanning utilities such as FSCAN and KSCAN. Legitimate programs like Wevtutil.exe clean Windows applications, systems, and security event logs.

The selected intrusion targeting Indian entities attempted to deploy Mimic Ransomware binaries to encrypt the victim files, but the efforts were largely unsuccessful.

“I saw actors stage the binaries of mimic ransomware in all observed cases, but ransomware often didn’t run properly, and in some instances the actors were trying to remove the binaries after deployment,” Sophos said in an analysis released in August 2024.

Then, earlier this month, EclecticiQ revealed that CL-STA-0048 is one of many Chinese and Nexus cyberspy groups that exploit CVE-2025-31324.

In addition to CVE-2025-31324, the hacking crew is said to have weaponized eight different vulnerabilities to violate public-facing servers –

Describing “very active,” Trend Micro noted that threat actors have shifted their focus from financial services to logistics and online retail and, more recently, to IT companies, universities and government organizations.

Cybersecurity

“We observed at the beginning and before 2024 that most of their goals were organizations within the financial industry, particularly related to securities and intermediaries,” the company said. “In late 2024, they shifted their goals to organizations primarily in the logistics and online retail industry. Recently, they noticed that Target has moved again to IT companies, universities and government organizations.”

A notable technique adopted by Earth Lamia is launching custom backdoors like PulsePack via DLL sideloads. This is a widely accepted approach among Chinese hacking groups. PulsePack, a modular .NET-based implant, communicates with remote servers to retrieve various plugins and perform functions.

Trend Micro said in March 2025 that it observed an updated version of the backdoor that changes command and control (C2) communication methods from TCP to WebSocket, indicating the aggressive ongoing development of malware.

“Earth Lamia is active in business in multiple countries and industries with a positive intention,” he concluded. “At the same time, threat actors will continuously improve their offensive tactics by developing custom hacking tools and new backdoors.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGraphene oxide material can replace PFA in food packaging
Next Article ExperienceIt arrives in Manchester – Meeting News
user
  • Website

Related Posts

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

July 28, 2025

Hackers Breach Toptal Github reveals 10 malicious NPM packages with 5,000 downloads

July 28, 2025

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

July 28, 2025
View 1 Comment

1 Comment

  1. avenue17 on June 21, 2025 11:21 am

    Also that we would do without your remarkable idea

    Reply
Leave A Reply Cancel Reply

Latest Posts

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Microsoft Edge has become an AI browser with launching “Copilot Mode”

Humanity announces new rate limits to curb Claude Code Power users

New York State Cyber Chief Calls Trump to Cut Cybersecurity

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.