Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Germ brings end-to-end encrypted messages to BlueSky

Hackers stole Social Security Number during Arians Life Cyber Attack

Zuckerberg Signal Meta does not open source all of its “Superintelligence” AI models

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit SAP vulnerabilities to deploy automatic color malware in violation of Linux systems
Identity

Hackers exploit SAP vulnerabilities to deploy automatic color malware in violation of Linux systems

userBy userJuly 30, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 30, 2025Ravi LakshmananVulnerability/Threat Intelligence

Hackers exploit SAP vulnerabilities

Threat officials have been observed to exploit the currently patched critical SAP NetWeaver flaws to deliver auto-collar backdoors in an attack targeting US-based chemical companies in April 2025.

“For three days, threat actors have accessed their clients’ networks, attempted to download some suspicious files, and communicated with malicious infrastructure linked to automatic color malware,” Darktrace said in a report they share with Hacker News.

The vulnerability in question is CVE-2025-31324. This is a severe, unauthenticated file upload bug in SAP NetWeaver that enables Remote Code Execution (RCE). The patch was applied by SAP in April.

Auto-Color was first documented by Palo Alto Networks Unit 42 in early February this year and works similar to a remote access trojan, allowing remote access to compromised Linux hosts. It was observed in attacks targeting universities and government organizations in North America and Asia from November to December 2024.

Cybersecurity

Malware has been known to hide malicious behavior if it cannot connect to a command and control (C2) server. This indicates that threat actors are trying to avoid detection by giving the impression that they are benign.

It supports a variety of functions, including reverse shell, creating and running files, system proxy configuration, global payload operations, system profiling, and even self-fusion when a kill switch is triggered.

The incident detected by DarkTrace took place on April 28th, when it was warned of suspicious ELF binaries downloads on an internet exposed machine that is likely to run SAP NetWeaver. That said, the first signs of scanning activity are said to have occurred at least three days ago.

“CVE-2025-31324 has launched a second-stage attack that was leveraged in this case and involves compromised devices for the Internet and downloading ELF files representing automatic colored malware,” the company said.

“From the initial intrusion to the failure to establish C2 communications, automatic color malware has demonstrated a clear understanding of Linux internally, demonstrating calculated constraints designed to minimize exposure and reduce the risk of detection.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleA UK study measures resistant bacteria levels in healthy pets
Next Article British Minister commits to green transportation and skilled work
user
  • Website

Related Posts

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

July 30, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025

Enabling remote hijacking via critical duffer camera defect ONVIF and file upload exploit

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Germ brings end-to-end encrypted messages to BlueSky

Hackers stole Social Security Number during Arians Life Cyber Attack

Zuckerberg Signal Meta does not open source all of its “Superintelligence” AI models

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.