Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

Children’s authors Mo Willems and The Pigeon stare at the future with a new book

A new strategy uses heterogeneous catalysts to eliminate PFA

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Chinese hackers exploit SAP RCE Flaw CVE-2025-31324 to deploy Golang-based SuperShell
Identity

Chinese hackers exploit SAP RCE Flaw CVE-2025-31324 to deploy Golang-based SuperShell

userBy userMay 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 9, 2025Ravi LakshmananVulnerability/Industrial Security

An unnamed Chinese-linked threat actor called Chaya_004 has been observed taking advantage of a security flaw recently disclosed in SAP NetWeaver.

Vedere Labs said in a report released today that since April 29, 2025, it has discovered malicious infrastructure that is likely to be associated with hacking groups weaponizing CVE-2025-31324 (CVSS score: 10.0).

CVE-2025-31324 refers to a critical SAP NetWeaver flaw that allows attackers to achieve remote code execution (RCE) by uploading a web shell through an influential “/Developmententerver/Metadatauploader” endpoint.

The vulnerability was first flagged by ReliaQuest late last month. This shows that the flaws are abused in real-world attacks by unknown threat actors dropping the web shell and the framework after the brute Ratel C4 explosion.

Cybersecurity

According to Onapsis, hundreds of SAP systems worldwide are sacrificing victims of attacks across industries and regions, including energy and utilities, manufacturing, media and entertainment, oil and gas, medicines, retail and government organizations.

The SAP Security Company said it had observed reconnaissance activities until January 20, 2025, including “testing on a specific payload for this vulnerability” with “testing on a specific payload for this vulnerability.”

Google-owned Mandiant, who is also involved in incident response efforts related to these attacks, has evidence of exploitation on March 12, 2025.

It is said that several threat actors have recently taken the exploitation bandwagon and targeted opportunistically vulnerable systems to adopt web shells and mine cryptocurrencies.

This also includes Chaya_004 for each Forescout. It hosts a web-based reverse shell written in Golang called Supershell with IP address 47.97.42.[.]177. Operational Technology (OT) security companies said they extracted the IP address from the configuration of the ELF binary names used in the attack.

“Same IP address hosting SuperShell (47.97.42[.]177) We also identified several other open ports, including 3232/HTTP, which used an anomalous self-signed certificate impersonating CloudFlare for the following characteristics: C=US, O=CloudFlare, Inc, CN=:3232, “Forescout Researchers Sai Molige and Luca Barba said.

Cybersecurity

Further analysis revealed that threat actors need to host a variety of tools across their infrastructure: NPS, Softer VPN, Cobalt Strike, Asset Regonnassance Lighthouse (ARL), Pocassit, GoSint, Go Simple Tunnel.

“The use of Chinese cloud providers and some Chinese tools point to threat actors who are likely to be based in China,” the researchers added.

To protect against attacks, it is essential that users patch as quickly as possible, but limit access to the metadata uploader endpoint, disable the Visual Composer service if not in use, and monitor suspicious activity.

Onapsis CTO Juan Pablo JP Perez-Etchegoyen said to Hacker News that the activity highlighted by Forescout is a post-patch, and appears to be rapidly responding to the unfolded web shells expanding not only opportunistic (and potentially sophisticated) threat actors, but also more advanced and expanding existing presence.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFreed Palestinian students accused Columbia of inciting violence
Next Article Russia-Ukraine War: List of Major Events, Day 1,170 | News of the Russian-Ukraine War
user
  • Website

Related Posts

Early Access Brokers are targeting Brazilian executives via NF-E spam and legal RMM trials

May 9, 2025

Do you want to deploy an AI agent? Learn to secure them before hackers attack your business

May 9, 2025

Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

Children’s authors Mo Willems and The Pigeon stare at the future with a new book

A new strategy uses heterogeneous catalysts to eliminate PFA

Russian military parade marks 80 years since victory over the Nazis | News of the Russian-Ukraine War

Trending Posts

Russian military parade marks 80 years since victory over the Nazis | News of the Russian-Ukraine War

May 9, 2025

Gaza Aid’s US Foundation Eyes Takeover | Israeli-Palestinian conflict news

May 9, 2025

Ukraine accuses duo of spying for Hungary | News of the Russian-Ukraine War

May 9, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Celsius founder Alex Masski has been sentenced to 12 years in a crypto fraud that was ordered to pay $48 million

New dedicated blockchain T-Rex raises $17 million to convert the attention layer of Web3

Top tech startup funding news for today, May 8, 2025

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.