Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors
Identity

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

userBy userJuly 4, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 4, 2025Ravi LakshmananZero Day / Cyber ​​Spy

Cybersecurity researchers are shedding light on a previously undocumented threat actor called Nighteagle (aka APT-Q-95), which has been observed to target Microsoft Exchange Servers as part of a zero-day exploit chain targeting China’s government, defense and technology sectors.

According to Qianxin’s Reddrip team, the threat actor has been active since 2023, switching network infrastructure at extremely fast speeds. The findings were presented at Cydes 2025, the third edition of Malaysia’s National Cyber ​​Defense & Security Exhibition and Conference, which will be held from July 1st to 3rd, 2025.

Cybersecurity

“It looks like it’s running at night in China,” the cybersecurity vendor said, explaining the rationale behind nainasguru’s name.

The attacks mounted by threat actors achieved the main goal of single-outing entities operating in high-tech, chip semiconductors, quantum technology, artificial intelligence, and military verticals, and collecting intelligence.

The company also noted that it began its investigation after discovering a bespoke version of the GO-based chisel utility, one of its customer endpoints configured to automatically start every four hours as part of a scheduled task.

“The attacker achieved the Intranet Penetration feature by modifying the source code of the open source Chisel Intranet Penetration tool, hard-coded execution parameters, using the specified username and password, establishing a sock connection with the 443 end of the specified C&C address, and mapping it to the specified port of the C&C host.

Cybersecurity

The Trojan is said to be delivered by a .NET loader, and it is embedded in the Internet Information Server (IIS) service on Microsoft Exchange Server. Further analysis determined the existence of zero-days that allow an attacker to obtain a MachineKey and gain unauthorized access to the Exchange server.

“The attacker could de-emphasize the Exchange server using the key, thereby porting the Trojan to a server that conforms to the Exchange version, allowing anyone to read mailbox data remotely,” the report states.

Qianxin argued that the activity was likely to be the work of threat actors from North America, given that the attack took place between 9pm and 6am Beijing time. The Hacker News reached out to Microsoft for further comment. I’ll update the story if I get a response.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIntestinal bacteria can cleanse the body of toxic PFAS chemicals
Next Article How the Green Energy Transfer Will Increase Productivity in the UK
user
  • Website

Related Posts

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

July 17, 2025

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

July 17, 2025

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.