Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

New Orleans is holding burials of African Americans whose skulls were used in racist studies

Two people were killed in Russian attacks on Ukraine before a possible lecture at Turkiye | News of the Russian-Ukraine War

NAACP invites Memphis officials to stop operations at Xai’s “Dirty Data Center”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks
Identity

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

userBy userMay 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 30, 2025Ravi LakshmananVulnerability/Threat Intelligence

China-related threat actors behind recent wild exploitation in SAP NetWeaver have been attributed to a broader set of attacks targeting organizations in Brazil, India and Southeast Asia since 2023.

“Threat actors are primarily targeted at accessing the target organization’s SQL servers by targeting SQL injection vulnerabilities discovered in web applications,” said Joseph C Chen of Trend Micro Security Researcher in an analysis published this week. “The actors are also leveraging a variety of known vulnerabilities to leverage public servers.”

Other prominent targets of hostile groups include Indonesia, Malaysia, the Philippines, Thailand and Vietnam.

The cybersecurity company tracks its activities under Earth Lamia in Moniker, saying that the activities share some degree of overlap with the threat cluster documented by the Elastic Security Lab, STAC6451 by Sophos and the CL-STA-0048 by Palo Alto Networks Unit 42.

Cybersecurity

Each of these attacks targets organizations across multiple sectors in South Asia, often leveraging Microsoft SQL servers and other instances exposed to the internet to conduct reconnaissance, deploying post-extracted tools such as Cobalt Strike and Supershell, and using Laksasa and Stowway to establish proxy tunnels in the victim network.

Privileged escalation tools such as Godpotato and Juicypotato are also used. Network scanning utilities such as FSCAN and KSCAN. Legitimate programs like Wevtutil.exe clean Windows applications, systems, and security event logs.

The selected intrusion targeting Indian entities attempted to deploy Mimic Ransomware binaries to encrypt the victim files, but the efforts were largely unsuccessful.

“I saw actors stage the binaries of mimic ransomware in all observed cases, but ransomware often didn’t run properly, and in some instances the actors were trying to remove the binaries after deployment,” Sophos said in an analysis released in August 2024.

Then, earlier this month, EclecticiQ revealed that CL-STA-0048 is one of many Chinese and Nexus cyberspy groups that exploit CVE-2025-31324.

In addition to CVE-2025-31324, the hacking crew is said to have weaponized eight different vulnerabilities to violate public-facing servers –

Describing “very active,” Trend Micro noted that threat actors have shifted their focus from financial services to logistics and online retail and, more recently, to IT companies, universities and government organizations.

Cybersecurity

“We observed at the beginning and before 2024 that most of their goals were organizations within the financial industry, particularly related to securities and intermediaries,” the company said. “In late 2024, they shifted their goals to organizations primarily in the logistics and online retail industry. Recently, they noticed that Target has moved again to IT companies, universities and government organizations.”

A notable technique adopted by Earth Lamia is launching custom backdoors like PulsePack via DLL sideloads. This is a widely accepted approach among Chinese hacking groups. PulsePack, a modular .NET-based implant, communicates with remote servers to retrieve various plugins and perform functions.

Trend Micro said in March 2025 that it observed an updated version of the backdoor that changes command and control (C2) communication methods from TCP to WebSocket, indicating the aggressive ongoing development of malware.

“Earth Lamia is active in business in multiple countries and industries with a positive intention,” he concluded. “At the same time, threat actors will continuously improve their offensive tactics by developing custom hacking tools and new backdoors.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGraphene oxide material can replace PFA in food packaging
Next Article ExperienceIt arrives in Manchester – Meeting News
user
  • Website

Related Posts

New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora

May 31, 2025

US DOJ seizes four domains that support cybercrime crypto services in global operations

May 31, 2025

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New Orleans is holding burials of African Americans whose skulls were used in racist studies

Two people were killed in Russian attacks on Ukraine before a possible lecture at Turkiye | News of the Russian-Ukraine War

NAACP invites Memphis officials to stop operations at Xai’s “Dirty Data Center”

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Trending Posts

Two people were killed in Russian attacks on Ukraine before a possible lecture at Turkiye | News of the Russian-Ukraine War

May 31, 2025

Saudi Arabia says it will fund Syrian salaries in jointly with Qatar | Syrian War News

May 31, 2025

India’s top general admits “loss” in the air in recent conflict with Pakistan | India and Pakistan tension news

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Things AI can do, but laws won’t allow: 16 profitable AI ideas big tech won’t touch (but you can)

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.