Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks

Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages

Procuring multiple rounds of venture capital could be wrong for your startup

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors
Identity

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

userBy userJuly 4, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 4, 2025Ravi LakshmananZero Day / Cyber ​​Spy

Cybersecurity researchers are shedding light on a previously undocumented threat actor called Nighteagle (aka APT-Q-95), which has been observed to target Microsoft Exchange Servers as part of a zero-day exploit chain targeting China’s government, defense and technology sectors.

According to Qianxin’s Reddrip team, the threat actor has been active since 2023, switching network infrastructure at extremely fast speeds. The findings were presented at Cydes 2025, the third edition of Malaysia’s National Cyber ​​Defense & Security Exhibition and Conference, which will be held from July 1st to 3rd, 2025.

Cybersecurity

“It looks like it’s running at night in China,” the cybersecurity vendor said, explaining the rationale behind nainasguru’s name.

The attacks mounted by threat actors achieved the main goal of single-outing entities operating in high-tech, chip semiconductors, quantum technology, artificial intelligence, and military verticals, and collecting intelligence.

The company also noted that it began its investigation after discovering a bespoke version of the GO-based chisel utility, one of its customer endpoints configured to automatically start every four hours as part of a scheduled task.

“The attacker achieved the Intranet Penetration feature by modifying the source code of the open source Chisel Intranet Penetration tool, hard-coded execution parameters, using the specified username and password, establishing a sock connection with the 443 end of the specified C&C address, and mapping it to the specified port of the C&C host.

Cybersecurity

The Trojan is said to be delivered by a .NET loader, and it is embedded in the Internet Information Server (IIS) service on Microsoft Exchange Server. Further analysis determined the existence of zero-days that allow an attacker to obtain a MachineKey and gain unauthorized access to the Exchange server.

“The attacker could de-emphasize the Exchange server using the key, thereby porting the Trojan to a server that conforms to the Exchange version, allowing anyone to read mailbox data remotely,” the report states.

Qianxin argued that the activity was likely to be the work of threat actors from North America, given that the attack took place between 9pm and 6am Beijing time. The Hacker News reached out to Microsoft for further comment. I’ll update the story if I get a response.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIntestinal bacteria can cleanse the body of toxic PFAS chemicals
Next Article How the Green Energy Transfer Will Increase Productivity in the UK
user
  • Website

Related Posts

A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks

August 21, 2025

Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages

August 21, 2025

Hackers spreading Agent Tesla, Asyncrat and Snake KeyLogger using the new QuirkyLoader malware

August 21, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

A Pre-Auth Exploit chain found in Commvault could allow remote code execution attacks

Cybercriminals Deploy Cornflake.v3 Backdoor Clickfix Tactics and Fake Captcha Pages

Procuring multiple rounds of venture capital could be wrong for your startup

Google’s AI mode will be expanded globally with new agent functionality added

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.