Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware

Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware

Posted on November 21, 2025November 21, 2025 By CWS

Chinese language-backed attackers have begun weaponizing a important vulnerability in Microsoft Home windows Server Replace Providers (WSUS) to distribute ShadowPad, a classy backdoor malware linked to a number of state-sponsored teams.

The assault chain exploits CVE-2025-59287, a distant code execution flaw that grants system-level entry to susceptible servers.

Because the proof-of-concept code was launched publicly in October, risk actors have quickly adopted this vulnerability to compromise enterprise networks working WSUS infrastructure.

The assault begins when hackers goal Home windows Servers with WSUS enabled, leveraging CVE-2025-59287 to realize preliminary system entry.

As soon as inside, attackers deploy PowerCat, an open-source PowerShell-based utility that gives direct command shell entry to the compromised system.

This primary-stage foothold permits attackers to execute subsequent instructions wanted for malware deployment.

ASEC safety analysts recognized the malware after observing PowerCat execution instructions being utilized in assaults.

The researchers documented how risk actors then obtain and set up ShadowPad utilizing respectable Home windows utilities like certutil and curl. This system helps evade detection as a result of these instruments are customary parts of Home windows methods.

On November sixth, ASEC’s infrastructure detected attackers downloading a number of encoded information earlier than decoding and executing them because the ShadowPad payload.

Persistence By DLL Sideloading

ShadowPad operates by means of a intelligent evasion approach referred to as DLL sideloading. Moderately than working as a standalone executable, the malware makes use of a respectable Home windows utility (ETDCtrlHelper.exe) that masses a malicious DLL (ETDApix.dll) with the identical identify.

When the respectable program runs, it unknowingly masses the compromised library, which acts as a loader for the precise ShadowPad backdoor working completely in reminiscence.

The core malware performance is saved in a brief file containing full backdoor configuration knowledge.

The malware establishes persistence by creating providers, registry entries, and scheduled duties with the identifier “Q-X64.” It communicates with command-and-control servers at 163.61.102[.]245 utilizing HTTP and HTTPS protocols whereas disguising site visitors with customary Firefox browser headers.

The malware can inject itself into a number of system processes, together with Home windows Mail, Media Participant, and svchost providers.

Organizations working WSUS ought to instantly apply Microsoft’s safety replace for CVE-2025-59287 and monitor server logs for suspicious PowerShell, certutil, and curl execution patterns to detect potential compromise makes an attempt.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Chinese, Code, Deploy, Execution, Exploiting, Hackers, Malware, Remote, ShadowPad, Vulnerability, WSUS

Post navigation

Previous Post: Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
Next Post: Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message

Related Posts

Critical Update for SolarWinds Serv-U: Prevent Root Access Threat Critical Update for SolarWinds Serv-U: Prevent Root Access Threat Cyber Security News
Hacker Extradited to US for Stealing Over .5 Million in Tax Fraud Attacks Hacker Extradited to US for Stealing Over $2.5 Million in Tax Fraud Attacks Cyber Security News
Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack Hackers Abusing Google Tasks Notification for Sophisticated Phishing Attack Cyber Security News
Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America Incident Response Team ShieldForce Partners with AccuKnox to Deliver Zero Trust CNAPP in Latin America Cyber Security News
FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign FBI Warns of US Govt Officials Impersonated in Malicious Message Campaign Cyber Security News
CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks CISA Warns of Citrix RCE and Privilege Escalation Vulnerabilities Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark