Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

Posted on May 30, 2025May 30, 2025 By CWS

Could 30, 2025Ravie LakshmananVulnerability / Menace Intelligence
The China-linked risk actor behind the current in-the-wild exploitation of a crucial safety flaw in SAP NetWeaver has been attributed to a broader set of assaults concentrating on organizations in Brazil, India, and Southeast Asia since 2023.
“The risk actor primarily targets the SQL injection vulnerabilities found on internet purposes to entry the SQL servers of focused organizations,” Pattern Micro safety researcher Joseph C Chen stated in an evaluation revealed this week. “The actor additionally takes benefit of assorted recognized vulnerabilities to use public-facing servers.”
A few of the different distinguished targets of the adversarial collective embrace Indonesia, Malaysia, the Philippines, Thailand, and Vietnam.
The cybersecurity firm is monitoring the exercise below the moniker Earth Lamia, stating the exercise shares a point of overlap with risk clusters documented by Elastic Safety Labs as REF0657, Sophos as STAC6451, and Palo Alto Networks Unit 42 as CL-STA-0048.

Every of those assaults has focused organizations spanning a number of sectors in South Asia, usually leveraging internet-exposed Microsoft SQL Servers and different situations to conduct reconnaissance, deploy post-exploitation instruments like Cobalt Strike and Supershell, and set up proxy tunnels to the sufferer networks utilizing Rakshasa and Stowaway.
Additionally used are privilege escalation instruments like GodPotato and JuicyPotato; community scanning utilities comparable to Fscan and Kscan; and bonafide packages like wevtutil.exe to wash Home windows Software, System, and Safety occasion logs.
Choose intrusions geared toward Indian entities have additionally tried to deploy Mimic ransomware binaries to encrypt sufferer information, though the efforts have been largely unsuccessful.
“Whereas the actors have been seen staging the Mimic ransomware binaries in all noticed incidents, the ransomware usually didn’t efficiently execute, and in a number of situations, the actors have been seen making an attempt to delete the binaries after being deployed,” Sophos famous in an evaluation revealed in August 2024.
Then earlier this month, EclecticIQ disclosed that CL-STA-0048 was one among the many many China-nexus cyber espionage teams to use CVE-2025-31324, a crucial unauthenticated file add vulnerability in SAP NetWeaver to determine a reverse shell to infrastructure below its management.

In addition to CVE-2025-31324, the hacking crew is claimed to have weaponized as many as eight totally different vulnerabilities to breach public-facing servers –

Describing it as “extremely energetic,” Pattern Micro famous that the risk actor has shifted its focus from monetary providers to logistics and on-line retail, and most just lately, to IT firms, universities, and authorities organizations.

“In early 2024 and prior, we noticed that the majority of their targets have been organizations inside the monetary trade, particularly associated to securities and brokerage,” the corporate stated. “Within the second half of 2024, they shifted their targets to organizations primarily within the logistics and on-line retail industries. Just lately, we observed that their targets have shifted once more to IT firms, universities, and authorities organizations.”
A noteworthy approach adopted by Earth Lamia is to launch its customized backdoors like PULSEPACK by way of DLL side-loading, an strategy extensively embraced by Chinese language hacking teams. A modular .NET-based implant, PULSEPACK communicates with a distant server to retrieve varied plugins to hold out its capabilities.
Pattern Micro stated it noticed in March 2025 an up to date model of the backdoor that adjustments the command-and-control (C2) communication methodology from TCP to WebSocket, indicating energetic ongoing improvement of the malware.
“Earth Lamia is conducting its operations throughout a number of international locations and industries with aggressive intentions,” it concluded. “On the similar time, the risk actor repeatedly refines their assault techniques by creating customized hacking instruments and new backdoors.”

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Asia, Attacks, Brazil, ChinaLinked, Exploit, Flaws, Hackers, SAP, Server, SQL

Post navigation

Previous Post: Chinese Hacking Group APT41 Exploits Google Calendar to Target Governments
Next Post: New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

Related Posts

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards The Hacker News
A Look Inside Pillar’s AI Security Platform The Hacker News
n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions The Hacker News
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware The Hacker News
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response The Hacker News
PyPI Warns of Ongoing Phishing Campaign Using Fake Verification Emails and Lookalike Domain The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 2 Venezuelans Convicted in US for Using Malware to Hack ATMs
  • North Korean Hackers Adopted AI to Generate Malware Attacking Developers and Engineering Teams
  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms
  • New Windows 11 KB5074109 Update Breaks Systems
  • ZAP Releases OWASP PenTest Kit Browser Extension for Application Security Testing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark