• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Chinese language Hackers Weaponize Open-Supply Nezha Device in New Assault Wave

Admin by Admin
October 8, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Oct 08, 2025Ravie LakshmananMalware / Risk Intelligence

Risk actors with suspected ties to China have turned a reputable open-source monitoring instrument known as Nezha into an assault weapon, utilizing it to ship a recognized malware known as Gh0st RAT to targets.

The exercise, noticed by cybersecurity firm Huntress in August 2025, is characterised by means of an uncommon method known as log poisoning (aka log injection) to plant a internet shell on an online server.

“This allowed the risk actor to manage the online server utilizing ANTSWORD, earlier than finally deploying Nezha, an operation and monitoring instrument that permits instructions to be run on an online server,” researchers Jai Minton, James Northey, and Alden Schmidt stated in a report shared with The Hacker Information.

DFIR Retainer Services

In all, the intrusion is alleged to have doubtless compromised greater than 100 sufferer machines, with a majority of the infections reported in Taiwan, Japan, South Korea, and Hong Kong.

The assault chain pieced collectively by Huntress exhibits that the attackers, described as a “technically proficient adversary,” leveraged a publicly uncovered and weak phpMyAdmin panel to acquire preliminary entry, after which set the language to simplified Chinese language.

The risk actors have been subsequently discovered to entry the server SQL question interface and run varied SQL instructions in fast succession with a purpose to drop a PHP internet shell in a listing accessible over the web after guaranteeing that the queries are logged to disk by enabling common question logging.

“They then issued a question containing their one-liner PHP internet shell, inflicting it to be recorded within the log file,” Huntress defined. “Crucially, they set the log file’s title with a .php extension, permitting it to be executed instantly by sending POST requests to the server.”

The entry afforded by the ANTSWORD internet shell is then used to run the “whoami” command to find out the privileges of the online server and ship the open-source Nezha agent, which can be utilized to remotely commandeer an contaminated host by connecting to an exterior server (“c.mid[.]al”).

An fascinating facet of the assault is that the risk actor behind the operation has been working their Nezha dashboard in Russian, with over 100 victims listed internationally. A smaller focus of victims is scattered throughout Singapore, Malaysia, India, the U.Okay., the U.S., Colombia, Laos, Thailand, Australia, Indonesia, France, Canada, Argentina, Sri Lanka, the Philippines, Eire, Kenya, and Macao, amongst others.

CIS Build Kits

The Nezha agent permits the following stage of the assault chain, facilitating the execution of an interactive PowerShell script to create Microsoft Defender Antivirus exclusions and launch Gh0st RAT, a malware broadly utilized by Chinese language hacking teams. The malware is executed via a loader that, in flip, runs a dropper chargeable for configuring and beginning the principle payload.

“This exercise highlights how attackers are more and more abusing new and rising publicly accessible tooling because it turns into accessible to attain their targets,” the researchers stated.

“Attributable to this, it is a stark reminder that whereas publicly accessible tooling can be utilized for reputable functions, it is also generally abused by risk actors because of the low analysis price, means to supply believable deniability in comparison with bespoke malware, and chance of being undetected by safety merchandise.”

Tags: AttackChineseHackersNezhaopensourcetoolWaveWeaponize
Admin

Admin

Next Post
Zuckerberg warns individuals with out AI glasses will fall behind – Automated Residence

Zuckerberg warns individuals with out AI glasses will fall behind – Automated Residence

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Steps to Embrace Sustainable and Eco-Pleasant Kitchen Merchandise for Conscious Homemakers – Chefio

Steps to Embrace Sustainable and Eco-Pleasant Kitchen Merchandise for Conscious Homemakers – Chefio

February 11, 2026
Prime 10 Ransomware Targets by Business

Prime 10 Ransomware Targets by Business

February 11, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved