Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

Posted on November 7, 2025November 7, 2025 By CWS

A China-linked risk actor has been attributed to a cyber assault concentrating on an U.S. non-profit group with an goal to determine long-term persistence, as a part of broader exercise geared toward U.S. entities which can be linked to or concerned in coverage points.
The group, in line with a report from Broadcom’s Symantec and Carbon Black groups, is “lively in making an attempt to affect U.S. authorities coverage on worldwide points.” The attackers managed to achieve entry to the community for a number of weeks in April 2025.
The primary signal of exercise occurred on April 5, 2025, when mass scanning efforts have been detected towards a server by leveraging numerous well-known exploits, together with CVE-2022-26134 (Atlassian), CVE-2021-44228 (Apache Log4j), CVE-2017-9805 (Apache Struts), and CVE-2017-17562 (GoAhead Internet Server).

No additional actions have been recorded till April 16, when the assaults executed a number of curl instructions to check web connectivity, after which the Home windows command-line device netstat was executed to gather community configuration info. This was adopted by organising persistence on the host by the use of a scheduled activity.
The duty was designed to execute a official Microsoft binary “msbuild.exe” to run an unknown payload, in addition to create one other scheduled activity that is configured to run each 60 minutes as a high-privileged SYSTEM consumer.
This new activity, Symantec and Carbon Black stated, was able to loading and injecting unknown code into “csc.exe” that in the end established communications with a command-and-control (C2) server (“38.180.83[.]166”). Subsequently, the attackers have been noticed executing a customized loader to unpack and run an unspecified payload, seemingly a distant entry trojan (RAT) in reminiscence.
Additionally noticed was the execution of the official Vipre AV element (“vetysafe.exe”) to sideload a DLL loader (“sbamres.dll”). This element can also be stated to have been used for DLL side-loading in reference to Deed RAT (aka Snappybee) in prior exercise attributed to Salt Storm (aka Earth Estries), and in assaults attributed to Earth Longzhi, a sub-cluster of APT41.
“A replica of this malicious DLL was beforehand utilized in assaults linked to the China-based risk actors generally known as House Pirates,” Broadcom stated. “A variant of this element, with a distinct filename, was additionally utilized by that Chinese language APT group Kelp (aka Salt Storm) in a separate incident.”
A few of the different instruments noticed within the focused community included Dcsync and Imjpuexc. It is not clear how profitable the attackers have been of their efforts. No further exercise was registered after April 16, 2025.
“It’s clear from the exercise on this sufferer that the attackers have been aiming to determine a persistent and stealthy presence on the community, and so they have been additionally very fascinated by concentrating on area controllers, which may doubtlessly enable them to unfold to many machines on the community,” Symantec and Carbon Black stated.
“The sharing of instruments amongst teams has been a long-standing development amongst Chinese language risk actors, making it troublesome to say which particular group is behind a set of actions.”
The disclosure comes as a safety researcher who goes by the net moniker BartBlaze disclosed Salt Storm’s exploitation of a safety flaw in WinRAR (CVE-2025-8088) to provoke an assault chain that sideloads a DLL chargeable for working shellcode on the compromised host. The ultimate payload is designed to determine contact with a distant server (“mimosa.gleeze[.]com”).
Exercise from Different Chinese language Hacking Teams
Based on a report from ESET, China-aligned teams have continued to stay lively, putting entities throughout Asia, Europe, Latin America, and the U.S. to serve Beijing’s geopolitical priorities. A few of the notable campaigns embrace –

The concentrating on of the vitality sector in Central Asia by a risk actor codenamed Speccom in July 2025 by way of phishing emails to ship a variant of BLOODALCHEMY and customized backdoors akin to kidsRAT and RustVoralix.The concentrating on of European organizations by a risk actor codenamed DigitalRecyclers in July 2025, utilizing an uncommon persistence method that concerned the usage of the Magnifier accessibility device to achieve SYSTEM privileges.The concentrating on of governmental entities in Latin America (Argentina, Ecuador, Guatemala, Honduras, and Panama) between June and September 2025 by a risk actor codenamed FamousSparrow that seemingly exploited ProxyLogon flaws in Microsoft Alternate Server to deploy SparrowDoor.The concentrating on of a Taiwanese firm within the protection aviation sector, a U.S. commerce group based mostly in China, and the China-based places of work of a Greek governmental entity, and an Ecuadorian authorities physique between Might and September 2025 by a risk actor codenamed SinisterEye (aka LuoYu and Cascade Panda) to ship malware like WinDealer (for Home windows) and SpyDealer (for Android) utilizing adversary-in-the-middle (AitM) assaults to hijack official software program replace mechanisms.The concentrating on of a Japanese firm and a multinational enterprise, each in Cambodia, in June 2025 by a risk actor codenamed PlushDaemon by the use of AitM poisoning to ship SlowStepper.

“PlushDaemon achieves AitM positioning by compromising community units akin to routers, and deploying a device that we’ve named EdgeStepper, which redirects DNS site visitors from the focused community to a distant, attacker-controlled DNS server,” ESET stated.
“This server responds to queries for domains related to software program replace infrastructure with the IP deal with of the net server that performs the replace hijacking and in the end serves PlushDaemon’s flagship backdoor, SlowStepper.”
Chinese language Hacking Teams Goal Misconfigured IIS Servers
In current months, risk hunters have additionally noticed a Chinese language-speaking risk actor concentrating on misconfigured IIS servers utilizing publicly uncovered machine keys to put in a backdoor known as TOLLBOOTH (aka HijackServer) that comes with web optimization cloaking and net shell capabilities.

“REF3927 abuses publicly disclosed ASP.NET machine keys to compromise IIS servers and deploy TOLLBOOTH web optimization cloaking modules globally,” Elastic Safety Labs researchers stated in a report printed late final month. Per HarfangLab, the operation has contaminated tons of of servers around the globe, with infections concentrated in India and the U.S.
The assaults are additionally characterised by makes an attempt to weaponize the preliminary entry to drop the Godzilla net shell, execute GotoHTTP distant entry device, use Mimikatz to reap credentials, and deploy HIDDENDRIVER, a modified model of the open supply rootkit Hidden, to hide the presence of malicious payloads on the contaminated machine.
It is price declaring that the cluster is the most recent addition to an extended record of Chinese language risk actors, akin to GhostRedirector, Operation Rewrite, and UAT-8099, which have focused IIS servers, indicating a surge in such exercise.
“Whereas the malicious operators look like utilizing Chinese language as their fundamental language and leveraging the compromises to assist SEO (web optimization), we discover that the deployed module gives a persistent and unauthenticated channel which permits any celebration to remotely execute instructions on affected servers,” the French cybersecurity firm stated.

The Hacker News Tags:Bugs, Chinas, Espionage, Global, Hackers, IIS, Legacy, Log4j, Tools, Turn

Post navigation

Previous Post: Landfall Android Spyware Targeted Samsung Phones via Zero-Day
Next Post: In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests

Related Posts

Step Into the Password Graveyard… If You Dare (and Join the Live Session) The Hacker News
Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide The Hacker News
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats The Hacker News
Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure The Hacker News
CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
  • Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ClickFix Attacks Evolved With Weaponized Videos That Tricks Users via Self-infection Process
  • Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
  • Herodotus Android Banking Malware Takes Full Control Of Device Evading Antivirus
  • Hackers Can Attack Active Directory Sites to Escalate Privileges and Compromise the Domain
  • In Other News: Controversial Ransomware Report, Gootloader Returns, More AN0M Arrests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News