Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware

Posted on July 30, 2025July 30, 2025 By CWS

A classy cyberattack concentrating on a US-based chemical compounds firm has revealed the primary noticed pairing of SAP NetWeaver exploitation with Auto-Shade malware, demonstrating how risk actors are leveraging important vulnerabilities to deploy superior persistent threats on Linux techniques. 

In April 2025, cybersecurity agency Darktrace efficiently detected and contained an assault that exploited CVE-2025-31324, a important vulnerability in SAP NetWeaver, to deploy the stealthy Auto-Shade backdoor malware over three days.

Key Takeaways1. CVE-2025-31324 SAP NetWeaver assault deployed Auto-Shade malware.2. Auto-Shade makes use of Linux manipulation and adaptive evasion strategies.3. Darktrace prevented malware activation and C2 communication.

 SAP NetWeaver Vulnerability Exploited

The assault started with the exploitation of CVE-2025-31324, a important vulnerability disclosed by SAP SE on April 24, 2025, that impacts SAP NetWeaver utility servers. 

This vulnerability allows malicious actors to add recordsdata to the server, probably resulting in distant code execution and full system compromise. 

Menace actors performed reconnaissance actions beginning April 25, scanning for the vulnerability utilizing URIs containing /developmentserver/metadatauploader earlier than launching the complete assault two days later.

The preliminary compromise occurred by way of a ZIP file obtain from a malicious IP deal with 91.193.19[.]109, accompanied by DNS tunneling requests to Out-of-Band Utility Safety Testing (OAST) domains reminiscent of aaaaaaaaaaaa[.]d06oojugfd4n58p4tj201hmy54tnq4rak[.]oast[.]me. 

The attackers then executed a shell script named config.sh by way of the helper.jsp file, establishing connections to C2 infrastructure at 47.97.42[.]177 over port 3232, an endpoint related to Supershell, a command-and-control platform linked to China-affiliated risk teams.

Auto-Shade Malware Persistence Methods

The Auto-Shade backdoor malware, named after its skill to rename itself to /var/log/cross/auto-color after execution, represents a complicated Distant Entry Trojan (RAT) that has primarily focused universities and authorities establishments since November 2024. 

The malware demonstrates adaptive habits primarily based on privilege ranges, with restricted performance when executed with out root privileges to keep away from detection in restricted environments.

When executed with root privileges, Auto-Shade performs invasive set up procedures, deploying a malicious shared object libcext.so.2 that masquerades as a reputable C utility library. 

The malware achieves persistence by way of ld.so.preload manipulation, modifying or creating /and many others/ld.so.preload to insert references to the malicious library. 

This method ensures the malware hundreds earlier than different libraries when executing dynamically linked applications, enabling it to hook and override customary system capabilities throughout purposes.

The profitable intervention by Darktrace’s Managed Detection and Response service, which prolonged Autonomous Response actions for a further 24 hours, supplied essential time for the shopper’s safety workforce to analyze and remediate the risk. 

The assault underscores the pressing want for organizations utilizing SAP NetWeaver to instantly apply safety patches, as risk actors proceed to use this important vulnerability throughout a number of techniques.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:AutoColor, Deploy, Exploiting, Hackers, Linux, Malware, NetWeaver, SAP, Vulnerability

Post navigation

Previous Post: Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal
Next Post: Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

Related Posts

SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials Cyber Security News
Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication Cyber Security News
Metasploit Module Released For Actively Exploited SharePoint 0-Day Vulnerabilities Cyber Security News
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News
Threat Actor Allegedly Selling FortiGate API Exploit Tool Targeting FortiOS Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News