Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting SAP NetWeaver Vulnerability to Deploy Auto-Color Linux Malware

Posted on July 30, 2025July 30, 2025 By CWS

A classy cyberattack concentrating on a US-based chemical compounds firm has revealed the primary noticed pairing of SAP NetWeaver exploitation with Auto-Shade malware, demonstrating how risk actors are leveraging important vulnerabilities to deploy superior persistent threats on Linux techniques. 

In April 2025, cybersecurity agency Darktrace efficiently detected and contained an assault that exploited CVE-2025-31324, a important vulnerability in SAP NetWeaver, to deploy the stealthy Auto-Shade backdoor malware over three days.

Key Takeaways1. CVE-2025-31324 SAP NetWeaver assault deployed Auto-Shade malware.2. Auto-Shade makes use of Linux manipulation and adaptive evasion strategies.3. Darktrace prevented malware activation and C2 communication.

 SAP NetWeaver Vulnerability Exploited

The assault started with the exploitation of CVE-2025-31324, a important vulnerability disclosed by SAP SE on April 24, 2025, that impacts SAP NetWeaver utility servers. 

This vulnerability allows malicious actors to add recordsdata to the server, probably resulting in distant code execution and full system compromise. 

Menace actors performed reconnaissance actions beginning April 25, scanning for the vulnerability utilizing URIs containing /developmentserver/metadatauploader earlier than launching the complete assault two days later.

The preliminary compromise occurred by way of a ZIP file obtain from a malicious IP deal with 91.193.19[.]109, accompanied by DNS tunneling requests to Out-of-Band Utility Safety Testing (OAST) domains reminiscent of aaaaaaaaaaaa[.]d06oojugfd4n58p4tj201hmy54tnq4rak[.]oast[.]me. 

The attackers then executed a shell script named config.sh by way of the helper.jsp file, establishing connections to C2 infrastructure at 47.97.42[.]177 over port 3232, an endpoint related to Supershell, a command-and-control platform linked to China-affiliated risk teams.

Auto-Shade Malware Persistence Methods

The Auto-Shade backdoor malware, named after its skill to rename itself to /var/log/cross/auto-color after execution, represents a complicated Distant Entry Trojan (RAT) that has primarily focused universities and authorities establishments since November 2024. 

The malware demonstrates adaptive habits primarily based on privilege ranges, with restricted performance when executed with out root privileges to keep away from detection in restricted environments.

When executed with root privileges, Auto-Shade performs invasive set up procedures, deploying a malicious shared object libcext.so.2 that masquerades as a reputable C utility library. 

The malware achieves persistence by way of ld.so.preload manipulation, modifying or creating /and many others/ld.so.preload to insert references to the malicious library. 

This method ensures the malware hundreds earlier than different libraries when executing dynamically linked applications, enabling it to hook and override customary system capabilities throughout purposes.

The profitable intervention by Darktrace’s Managed Detection and Response service, which prolonged Autonomous Response actions for a further 24 hours, supplied essential time for the shopper’s safety workforce to analyze and remediate the risk. 

The assault underscores the pressing want for organizations utilizing SAP NetWeaver to instantly apply safety patches, as risk actors proceed to use this important vulnerability throughout a number of techniques.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:AutoColor, Deploy, Exploiting, Hackers, Linux, Malware, NetWeaver, SAP, Vulnerability

Post navigation

Previous Post: Axonius Acquires Medical Device Security Firm Cynerio in $100 Million Deal
Next Post: Hackers Exploit SAP Vulnerability to Breach Linux Systems and Deploy Auto-Color Malware

Related Posts

Hackers Using PUP Advertisements to Silently Drop Windows Malware Cyber Security News
BeaverTail Variant via Malicious Repositories Targeting Retail Sector Organizations Cyber Security News
New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique Cyber Security News
Hackers Allegedly Selling WinRAR 0-day Exploit on Dark Web Forums for $80,000 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
  • Badges, Bytes and Blackmail
  • GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 
  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
  • Badges, Bytes and Blackmail
  • GhostChat Spyware Attacking Android Users Via WhatsApp to Exfiltrate Sensitive Details

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark