Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors

Posted on May 10, 2025May 11, 2025 By CWS

A important distant code execution vulnerability in SAP NetWeaver Visible Composer (CVE-2025-31324) is being actively exploited by a Chinese language menace actor to compromise enterprise programs worldwide.

The vulnerability permits attackers to realize distant code execution by importing malicious net shells by the weak /developmentserver/metadatauploader endpoint.

Exploitation has been noticed primarily focusing on manufacturing environments, the place compromised SAP programs may result in important operational disruptions and safety breaches.

The menace actor, tracked as Chaya_004, has been leveraging this vulnerability since a minimum of April 29, 2025, shortly after proof-of-concept exploits turned publicly out there.

Their assault infrastructure closely makes use of Chinese language cloud suppliers, together with Alibaba, Tencent, and Huawei Cloud Companies.

This marketing campaign demonstrates a complicated strategy to infrastructure deployment, with over 700 recognized IP addresses sharing constant configuration patterns.

Forescout researchers recognized the malicious infrastructure after recovering an ELF binary named “config” from one of many assaults.

The binary contained an IP handle internet hosting a SuperShell login interface, which led to the invention of a whole bunch of extra IP addresses sharing uncommon certificates configurations.

The certificates utilized anomalous self-signed properties impersonating Cloudflare with a particular topic DN attribute.

The exploitation sample includes POST requests to the weak endpoint, adopted by the deployment of net shells with names akin to “helper.jsp,” “cache.jsp,” or randomized eight-letter filenames like “ssonkfrd.jsp.”

As soon as established, these backdoors allow attackers to obtain extra malicious payloads utilizing curl instructions, as demonstrated within the following assault sequence:-

POST /developmentserver/metadatauploader HTTP/1.1
Host: [target]
Content material-Kind: multipart/form-data; boundary=—————————9051914041544843365972754266
Content material-Size: [length]

—————————–9051914041544843365972754266
Content material-Disposition: form-data; identify=”file”; filename=”webshell.jsp”
Content material-Kind: software/octet-stream

—————————–9051914041544843365972754266–

The deployed SuperShell backdoors present attackers with complete system entry, permitting them to govern service endpoints, harvest credentials, and probably pivot to extra important SAP parts.

The first backdoor interface was recognized on port 8888 with the distinctive path “/supershell/login” throughout a number of compromised programs.

Organizations working affected SAP variations are strongly urged to use the safety patches launched within the April 2025 Patch Day instantly.

Further really helpful mitigations embrace proscribing entry to metadata uploader companies, disabling unused net companies, and implementing real-time monitoring for anomalous entry to SAP programs, notably outdoors of normal upkeep home windows.

Are you from the SOC and DFIR Groups? – Analyse Actual time Malware Incidents with ANY.RUN -> Begin Now for Free.

Cyber Security News Tags:Backdoors, Chinese, Exploit, Hackers, RCE, SAP, SuperShell, Upload, Vulnerability

Post navigation

Previous Post: How to Browse the Internet Safely
Next Post: Threat Actors Attacking Job Seekers With Three New Unique Adversaries

Related Posts

Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild Lesson From Cisco ASA 0-Day RCE Vulnerability That Actively Exploited In The Wild Cyber Security News
PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309) PoC Exploit Released for CrushFTP 0-day Vulnerability (CVE-2025-54309) Cyber Security News
VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames Cyber Security News
Nova Ransomware Allegedly Claiming Breach of KPMG Netherlands Nova Ransomware Allegedly Claiming Breach of KPMG Netherlands Cyber Security News
Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files Cyber Security News
Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Critical FortiSIEM Vulnerability Let Attackers to Execute Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News