Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

Posted on May 10, 2025May 11, 2025 By CWS

A important distant code execution vulnerability in SAP NetWeaver Visible Composer (CVE-2025-31324) is being actively exploited by a Chinese language menace actor to compromise enterprise programs worldwide.

The vulnerability permits attackers to realize distant code execution by importing malicious net shells by the weak /developmentserver/metadatauploader endpoint.

Exploitation has been noticed primarily focusing on manufacturing environments, the place compromised SAP programs may result in important operational disruptions and safety breaches.

The menace actor, tracked as Chaya_004, has been leveraging this vulnerability since a minimum of April 29, 2025, shortly after proof-of-concept exploits turned publicly out there.

Their assault infrastructure closely makes use of Chinese language cloud suppliers, together with Alibaba, Tencent, and Huawei Cloud Companies.

This marketing campaign demonstrates a complicated strategy to infrastructure deployment, with over 700 recognized IP addresses sharing constant configuration patterns.

Forescout researchers recognized the malicious infrastructure after recovering an ELF binary named “config” from one of many assaults.

The binary contained an IP handle internet hosting a SuperShell login interface, which led to the invention of a whole bunch of extra IP addresses sharing uncommon certificates configurations.

The certificates utilized anomalous self-signed properties impersonating Cloudflare with a particular topic DN attribute.

The exploitation sample includes POST requests to the weak endpoint, adopted by the deployment of net shells with names akin to “helper.jsp,” “cache.jsp,” or randomized eight-letter filenames like “ssonkfrd.jsp.”

As soon as established, these backdoors allow attackers to obtain extra malicious payloads utilizing curl instructions, as demonstrated within the following assault sequence:-

POST /developmentserver/metadatauploader HTTP/1.1
Host: [target]
Content material-Kind: multipart/form-data; boundary=—————————9051914041544843365972754266
Content material-Size: [length]

—————————–9051914041544843365972754266
Content material-Disposition: form-data; identify=”file”; filename=”webshell.jsp”
Content material-Kind: software/octet-stream

—————————–9051914041544843365972754266–

The deployed SuperShell backdoors present attackers with complete system entry, permitting them to govern service endpoints, harvest credentials, and probably pivot to extra important SAP parts.

The first backdoor interface was recognized on port 8888 with the distinctive path “/supershell/login” throughout a number of compromised programs.

Organizations working affected SAP variations are strongly urged to use the safety patches launched within the April 2025 Patch Day instantly.

Further really helpful mitigations embrace proscribing entry to metadata uploader companies, disabling unused net companies, and implementing real-time monitoring for anomalous entry to SAP programs, notably outdoors of normal upkeep home windows.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Backdoors, Chinese, Exploit, Hackers, RCE, SAP, SuperShell, Upload, Vulnerability

Post navigation

Previous Post: How to Browse the Internet Safely
Next Post: Threat Actors Attacking Job Seekers With Three New Unique Adversaries

Related Posts

New ‘SleepyDuck’ Malware in Open VSX Marketplace Allow Attackers to Control Windows Systems Remotely Cyber Security News
GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing Cyber Security News
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Cyber Security News
Pune Auto Parts Firm Loses ₹2.35 Crore in Man-in-the-Middle Attack Cyber Security News
Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure Cyber Security News
Ashen Lepus Hacker Group Attacks Eastern Diplomatic Entities With New AshTag Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ivanti Patches Exploited EPMM Zero-Days
  • Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
  • Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads
  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark