Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

Posted on May 14, 2025May 14, 2025 By CWS

Might 14, 2025Ravie LakshmananRansomware / Vulnerability
At the very least two totally different cybercrime teams BianLian and RansomExx are stated to have exploited a not too long ago disclosed safety flaw in SAP NetWeaver, indicating that a number of risk actors are profiting from the bug.
Cybersecurity agency ReliaQuest, in a brand new replace revealed in the present day, stated it uncovered proof suggesting involvement from the BianLian knowledge extortion crew and the RansomExx ransomware household, which is traced by Microsoft below the moniker Storm-2460.
BianLian is assessed to be concerned in at the least one incident primarily based on infrastructure hyperlinks to IP addresses beforehand recognized as attributed to the e-crime group.

“We recognized a server at 184[.]174[.]96[.]74 internet hosting reverse proxy providers initiated by the rs64.exe executable,” the corporate stated. “This server is said to a different IP, 184[.]174[.]96[.]70, operated by the identical internet hosting supplier. The second IP had beforehand been flagged as a command-and-control (C2) server related to BianLian, sharing an identical certificates and ports.”
ReliaQuest stated it additionally noticed the deployment of a plugin-based trojan dubbed PipeMagic, which was most not too long ago utilized in reference to the zero-day exploitation of a privilege escalation bug (CVE-2025-29824) within the Home windows Frequent Log File System (CLFS) in restricted assaults concentrating on entities within the U.S., Venezuela, Spain, and Saudi Arabia.
The assaults concerned the supply of PipeMagic by way of internet shells dropped following the exploitation of the SAP NetWeaver flaw.
“Though the preliminary try failed, a subsequent assault concerned the deployment of the Brute Ratel C2 framework utilizing inline MSBuild activity execution,” ReliaQuest stated. “Throughout this exercise, a dllhost.exe course of was spawned, signaling exploitation of the CLFS vulnerability (CVE-2025-29824), which the group had beforehand exploited, with this being a brand new try to use it through inline meeting.”
The findings come a day after EclecticIQ disclosed that a number of Chinese language hacking teams tracked as UNC5221, UNC5174, and CL-STA-0048 are actively exploiting CVE-2025-31324 to drop varied malicious payloads.

SAP safety firm Onapsis revealed that risk actors have additionally been exploiting CVE-2025-31324 alongside a deserialization flaw in the identical part (CVE-2025-42999) since March 2025, including the brand new patch fixes the foundation reason for CVE-2025-31324.
“There may be little sensible distinction between CVE-2025-31324 and CVE-2025-42999 so long as CVE-2025-31324 is offered for exploitation,” ReliaQuest stated in an announcement shared with The Hacker Information.
“CVE-2025-42999 signifies greater privileges could be required, nevertheless, CVE-2025-31324 affords full system entry regardless. A risk actor might exploit each vulnerabilities in an authenticated and unauthenticated consumer in the identical approach. Due to this fact, the remediation recommendation is similar for each CVEs.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:BianLian, Deploy, Exploit, Flaw, NetWeaver, PipeMagic, RansomExx, SAP, Trojan

Post navigation

Previous Post: \Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant
Next Post: Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

Related Posts

State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability The Hacker News
First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package The Hacker News
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia The Hacker News
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs The Hacker News
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi The Hacker News
SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News