Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advanced PFAS treatment technology: innovation and development

Upside Robotics reduces fertilizer use and waste in corn crops

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit SAP vulnerabilities to deploy automatic color malware in violation of Linux systems
Identity

Hackers exploit SAP vulnerabilities to deploy automatic color malware in violation of Linux systems

userBy userJuly 30, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 30, 2025Ravi LakshmananVulnerability/Threat Intelligence

Hackers exploit SAP vulnerabilities

Threat officials have been observed to exploit the currently patched critical SAP NetWeaver flaws to deliver auto-collar backdoors in an attack targeting US-based chemical companies in April 2025.

“For three days, threat actors have accessed their clients’ networks, attempted to download some suspicious files, and communicated with malicious infrastructure linked to automatic color malware,” Darktrace said in a report they share with Hacker News.

The vulnerability in question is CVE-2025-31324. This is a severe, unauthenticated file upload bug in SAP NetWeaver that enables Remote Code Execution (RCE). The patch was applied by SAP in April.

Auto-Color was first documented by Palo Alto Networks Unit 42 in early February this year and works similar to a remote access trojan, allowing remote access to compromised Linux hosts. It was observed in attacks targeting universities and government organizations in North America and Asia from November to December 2024.

Cybersecurity

Malware has been known to hide malicious behavior if it cannot connect to a command and control (C2) server. This indicates that threat actors are trying to avoid detection by giving the impression that they are benign.

It supports a variety of functions, including reverse shell, creating and running files, system proxy configuration, global payload operations, system profiling, and even self-fusion when a kill switch is triggered.

The incident detected by DarkTrace took place on April 28th, when it was warned of suspicious ELF binaries downloads on an internet exposed machine that is likely to run SAP NetWeaver. That said, the first signs of scanning activity are said to have occurred at least three days ago.

“CVE-2025-31324 has launched a second-stage attack that was leveraged in this case and involves compromised devices for the Internet and downloading ELF files representing automatic colored malware,” the company said.

“From the initial intrusion to the failure to establish C2 communications, automatic color malware has demonstrated a clear understanding of Linux internally, demonstrating calculated constraints designed to minimize exposure and reduce the risk of detection.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA UK study measures resistant bacteria levels in healthy pets
Next Article British Minister commits to green transportation and skilled work
user
  • Website

Related Posts

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advanced PFAS treatment technology: innovation and development

Upside Robotics reduces fertilizer use and waste in corn crops

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.