Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

Posted on July 30, 2025July 30, 2025 By CWS

Jul 30, 2025Ravie LakshmananVulnerability / Menace Intelligence
Menace actors have been noticed exploiting a now-patched essential SAP NetWeaver flaw to ship the Auto-Shade backdoor in an assault concentrating on a U.S.-based chemical compounds firm in April 2025.
“Over the course of three days, a menace actor gained entry to the shopper’s community, tried to obtain a number of suspicious recordsdata and communicated with malicious infrastructure linked to Auto-Shade malware,” Darktrace mentioned in a report shared with The Hacker Information.
The vulnerability in query is CVE-2025-31324, a extreme unauthenticated file add bug in SAP NetWeaver that permits distant code execution (RCE). It was patched by SAP in April.
Auto-Shade, first documented by Palo Alto Networks Unit 42 earlier this February, features akin to a distant entry trojan, enabling distant entry to compromised Linux hosts. It was noticed in assaults concentrating on universities and authorities organizations in North America and Asia between November and December 2024.

The malware has been discovered to cover its malicious habits ought to it fail to hook up with its command-and-control (C2) server, an indication that the menace actors want to evade detection by giving the impression that it is benign.
It helps varied options, together with reverse shell, file creation and execution, system proxy configuration, world payload manipulation, system profiling, and even self-removal when a kill swap is triggered.

The incident detected by Darktrace happened on April 28, when it was alerted to the obtain of a suspicious ELF binary on an internet-exposed machine probably working SAP NetWeaver. That mentioned, preliminary indicators of scanning exercise are mentioned to have occurred at the least three days prior.
“CVE-2025-31324 was leveraged on this occasion to launch a second-stage assault, involving the compromise of the internet-facing gadget and the obtain of an ELF file representing the Auto-Shade malware,” the corporate mentioned.
“From preliminary intrusion to the failed institution of C2 communication, the Auto-Shade malware confirmed a transparent understanding of Linux internals and demonstrated calculated restraint designed to attenuate publicity and cut back the chance of detection.”

The Hacker News Tags:AutoColor, Breach, Deploy, Exploit, Hackers, Linux, Malware, SAP, Systems, Vulnerability

Post navigation

Previous Post: Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware
Next Post: ChatGPT Agent Bypasses Cloudflare “I am not a robot” Verification Checks

Related Posts

Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads Hackers Breach Toptal GitHub, Publish 10 Malicious npm Packages With 5,000 Downloads The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News
U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback The Hacker News
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads The Hacker News
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware The Hacker News
.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL .NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News