Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Veeam patches 7 critical backup and replication flaws that could allow remote code execution

Channel Surfer lets you watch YouTube like old-school cable TV

Why Rivian will keep the $45,000 base model R2 until “late 2027”

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Chinese hackers weaponize open source Nezha tools in new wave of attacks
Identity

Chinese hackers weaponize open source Nezha tools in new wave of attacks

userBy userOctober 8, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 8, 2025Ravi LakshmananMalware/Threat Intelligence

Attackers with suspected ties to China turned a legitimate open source monitoring tool called Nezha into an attack weapon and used it to deliver known malware called Gh0st RAT to their targets.

The activity, observed by cybersecurity firm Huntress in August 2025, features the use of an unusual technique called log poisoning (also known as log injection) to plant a web shell on a web server.

“This allowed the attackers to use ANTSWORD to take control of the web server before ultimately deploying Nezha, a manipulation and monitoring tool that allowed them to execute commands on the web server,” researchers Jai Minton, James Northey, and Alden Schmidt said in a report shared with The Hacker News.

DFIR retainer service

This intrusion likely compromised over 100 victim machines in total, with the majority of infections reported in Taiwan, Japan, South Korea, and Hong Kong.

The attack chain compiled by Huntress shows that the attacker, described as a “technically skilled adversary,” leveraged a publicly vulnerable phpMyAdmin panel to gain initial access and set the language to Simplified Chinese.

The attacker was then found to access the server’s SQL query interface, execute various SQL commands in rapid succession, and drop a PHP web shell into a directory accessible over the internet, after enabling general query logging and ensuring that queries were logged to disk.

“They then issued a query containing a one-liner PHP web shell, which was recorded in the log file,” Huntress explained. “The key is to name the log files with a .php extension so that they can be executed directly by making a POST request to the server.”

The access granted by the ANTSWORD web shell is used to run the “whoami” command, determine the permissions of the web server, and deliver the open source Nezha agent. This agent can be used to remotely take over infected hosts by connecting to an external server (‘c.mid’).[.]Al”).

An interesting aspect of this attack is that the attackers behind this operation run the Nezha dashboard in Russian, and it lists over 100 victims worldwide. Smaller victims are scattered across Singapore, Malaysia, India, the United Kingdom, the United States, Colombia, Laos, Thailand, Australia, Indonesia, France, Canada, Argentina, Sri Lanka, the Philippines, Ireland, Kenya, and Macau.

CIS build kit

The Nezha agent enables the next stage in the attack chain, facilitating the execution of interactive PowerShell scripts to create Microsoft Defender Antivirus exclusions and launch the Gh0st RAT, a malware widely used by Chinese hacker groups. The malware is executed by a loader, which runs a dropper that is responsible for configuring and starting the main payload.

“This activity highlights how attackers are increasingly exploiting newly released tools to achieve their goals,” the researchers said.

“This is another reminder that while publicly available tools can be used for legitimate purposes, they are often exploited by threat actors due to their lower research costs, their ability to provide plausible deniability compared to custom-built malware, and their greater likelihood of being undetected by security products.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLockBit, Qilin and DragonForce join forces to control the ransomware ecosystem
Next Article Tristan Thompson talks AI, sports, and startups at Disrupt 2025
user
  • Website

Related Posts

Veeam patches 7 critical backup and replication flaws that could allow remote code execution

March 13, 2026

Rust-based VENON malware targets 33 Brazilian banks with credential-stealing overlay

March 12, 2026

Hive0163 uses AI-assisted Slopoly malware for persistent access in ransomware attacks

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Veeam patches 7 critical backup and replication flaws that could allow remote code execution

Channel Surfer lets you watch YouTube like old-school cable TV

Why Rivian will keep the $45,000 base model R2 until “late 2027”

Tinder tries to lure people back to online dating with IRL events and virtual speed dating

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.