Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chinese hackers weaponize open source Nezha tools in new wave of attacks
Identity

Chinese hackers weaponize open source Nezha tools in new wave of attacks

userBy userOctober 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 8, 2025Ravi LakshmananMalware/Threat Intelligence

Attackers with suspected ties to China turned a legitimate open source monitoring tool called Nezha into an attack weapon and used it to deliver known malware called Gh0st RAT to their targets.

The activity, observed by cybersecurity firm Huntress in August 2025, features the use of an unusual technique called log poisoning (also known as log injection) to plant a web shell on a web server.

“This allowed the attackers to use ANTSWORD to take control of the web server before ultimately deploying Nezha, a manipulation and monitoring tool that allowed them to execute commands on the web server,” researchers Jai Minton, James Northey, and Alden Schmidt said in a report shared with The Hacker News.

DFIR retainer service

This intrusion likely compromised over 100 victim machines in total, with the majority of infections reported in Taiwan, Japan, South Korea, and Hong Kong.

The attack chain compiled by Huntress shows that the attacker, described as a “technically skilled adversary,” leveraged a publicly vulnerable phpMyAdmin panel to gain initial access and set the language to Simplified Chinese.

The attacker was then found to access the server’s SQL query interface, execute various SQL commands in rapid succession, and drop a PHP web shell into a directory accessible over the internet, after enabling general query logging and ensuring that queries were logged to disk.

“They then issued a query containing a one-liner PHP web shell, which was recorded in the log file,” Huntress explained. “The key is to name the log files with a .php extension so that they can be executed directly by making a POST request to the server.”

The access granted by the ANTSWORD web shell is used to run the “whoami” command, determine the permissions of the web server, and deliver the open source Nezha agent. This agent can be used to remotely take over infected hosts by connecting to an external server (‘c.mid’).[.]Al”).

An interesting aspect of this attack is that the attackers behind this operation run the Nezha dashboard in Russian, and it lists over 100 victims worldwide. Smaller victims are scattered across Singapore, Malaysia, India, the United Kingdom, the United States, Colombia, Laos, Thailand, Australia, Indonesia, France, Canada, Argentina, Sri Lanka, the Philippines, Ireland, Kenya, and Macau.

CIS build kit

The Nezha agent enables the next stage in the attack chain, facilitating the execution of interactive PowerShell scripts to create Microsoft Defender Antivirus exclusions and launch the Gh0st RAT, a malware widely used by Chinese hacker groups. The malware is executed by a loader, which runs a dropper that is responsible for configuring and starting the main payload.

“This activity highlights how attackers are increasingly exploiting newly released tools to achieve their goals,” the researchers said.

“This is another reminder that while publicly available tools can be used for legitimate purposes, they are often exploited by threat actors due to their lower research costs, their ability to provide plausible deniability compared to custom-built malware, and their greater likelihood of being undetected by security products.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLockBit, Qilin and DragonForce join forces to control the ransomware ecosystem
Next Article Tristan Thompson talks AI, sports, and startups at Disrupt 2025
user
  • Website

Related Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025

How Threat Hunting Builds Readiness

October 14, 2025

A single 8-byte write shatters AMD’s SEV-SNP Confidential Computing security

October 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

FleetWorks raises $17 million to match truck drivers with freight faster

Aquawise unveils AI-powered water quality technology at TechCrunch Disrupt 2025

Instagram shows PG-13 content to teens by default, adds parental controls

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Meet Your Digital Double: FySelf Unveils TwinH, the Future of Personalized Online Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.