Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Natsume’s Book of Friends Game Introduces Features in 3rd Promotional Video – News

May 9, 2025

Daisy-May Hudson Debuts Feature Film ‘Lollipop’ (Exclusive Trailer)

May 9, 2025

Beyond Vulnerability Management – Can You CVE What I CVE?

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
Cybersecurity

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

HarishBy HarishMay 9, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


May 09, 2025Ravie LakshmananVulnerability / Industrial Security

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver.

Forescout Vedere Labs, in a report published today, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025.

CVE-2025-31324 refers to a critical SAP NetWeaver flaw that allows attackers to achieve remote code execution (RCE) by uploading web shells through a susceptible “/developmentserver/metadatauploader” endpoint.

The vulnerability was first flagged by ReliaQuest late last month when it found the shortcoming being abused in real-world attacks by unknown threat actors to drop web shells and the Brute Ratel C4 post-exploitation framework.

Cybersecurity

According to Onapsis, hundreds of SAP systems globally have fallen victim to attacks spanning industries and geographies, including energy and utilities, manufacturing, media and entertainment, oil and gas, pharmaceuticals, retail, and government organizations.

The SAP security firm said it observed reconnaissance activity that involved “testing with specific payloads against this vulnerability” against its honeypots as far back as January 20, 2025. Successful compromises in deploying web shells were observed between March 14 and March 31.

Google-owned Mandiant, which is also engaged in incident response efforts related to these attacks, has evidence of exploitation occurring on March 12, 2025.

In recent days, multiple threat actors are said to have jumped aboard the exploitation bandwagon to opportunistically target vulnerable systems to deploy web shells and even mine cryptocurrency.

This, per Forescout, also includes Chaya_004, which has hosted a web-based reverse shell written in Golang called SuperShell on the IP address 47.97.42[.]177. The operational technology (OT) security company said it extracted the IP address from an ELF binary named config that was put to use in the attack.

“On the same IP address hosting Supershell (47.97.42[.]177), we also identified several other open ports, including 3232/HTTP using an anomalous self-signed certificate impersonating Cloudflare with the following properties: Subject DN: C=US, O=Cloudflare, Inc, CN=:3232,” Forescout researchers Sai Molige and Luca Barba said.

Cybersecurity

Further analysis has uncovered the threat actor has to be hosting various tools across infrastructure: NPS, SoftEther VPN, Cobalt Strike, Asset Reconnaissance Lighthouse (ARL), Pocassit, GOSINT, and GO Simple Tunnel.

“The use of Chinese cloud providers and several Chinese-language tools points to a threat actor likely based in China,” the researchers added.

To defend against attacks, it’s essential that users apply the patches as soon as possible, if not already, restrict access to the metadata uploader endpoint, disable the Visual Composer service if not in use, and monitor for suspicious activity.

Onapsis CTO Juan Pablo JP Perez-Etchegoyen told The Hacker News that the activity highlighted by Forescout is post-patch, and that it “will further expand the threat of leveraging deployed web shells not only to opportunistic (and potentially less sophisticated) threat actors, but also more advanced ones seem to have been rapidly reacting to this issue to leverage the existing compromises and further expand.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleJoe Hisaishi’s Orchestra Concert in Philadelphia Rescheduled to June 25-27 Following Composer’s Illness – News
Next Article AI decentralized apps are coming for the Web3 throne: DappRadar
Harish
  • Website
  • X (Twitter)

Related Posts

Beyond Vulnerability Management – Can You CVE What I CVE?

May 9, 2025

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

May 9, 2025

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

May 8, 2025

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

May 8, 2025

Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

May 8, 2025

Security Tools Alone Don’t Protect You — Control Effectiveness Does

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Natsume’s Book of Friends Game Introduces Features in 3rd Promotional Video – News

May 9, 2025

Daisy-May Hudson Debuts Feature Film ‘Lollipop’ (Exclusive Trailer)

May 9, 2025

Beyond Vulnerability Management – Can You CVE What I CVE?

May 9, 2025

Episode 5 – Apocalypse Hotel

May 9, 2025
Don't Miss
Blockchain

Solana lacks ‘convincing signs’ of besting Ethereum: Sygnum

May 9, 20253 Mins Read

Solana does not yet have “convincing signs” that it could overtake Ethereum as the blockchain…

AI decentralized apps are coming for the Web3 throne: DappRadar

May 9, 2025

SEC’s Crenshaw slams Ripple settlement, warns of ‘regulatory vacuum’

May 9, 2025

PayPal Ventures-backed Magic Labs launches Newton, a platform for verifiable AI agents in crypto

May 8, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

This is your last chance to exhibit at TechCrunch Sessions: AI — don’t miss out

May 9, 2025

Microsoft employees are banned from using DeepSeek app, president says 

May 8, 2025

ChatGPT’s deep research tool gets a GitHub connector to answer questions about code

May 8, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.