Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan

Threat Actors Weaponizing Nezha Monitoring Tool as Remote Access Trojan

Posted on December 23, 2025December 23, 2025 By CWS

Researchers at Ontinue’s Cyber Protection Heart have uncovered a major menace as attackers exploit Nezha, a legit open-source server monitoring device, for post-exploitation entry.

The invention reveals how refined menace actors repurpose benign software program to achieve full management over compromised techniques whereas evading conventional safety detection mechanisms.

Nezha, initially developed for the Chinese language IT group, has garnered almost 10,000 stars on GitHub and serves legit directors in monitoring a number of servers, monitoring useful resource utilization, and performing distant upkeep.

The device’s structure includes a central dashboard server coordinating light-weight brokers deployed throughout monitored techniques, enabling system well being commentary, command execution, file switch, and interactive terminal periods.

Nevertheless, these identical capabilities that make Nezha useful for legit use have made it a beautiful goal for malicious actors looking for undetected distant entry.

Ontinue analysts and researchers recognized the malware being weaponized throughout a post-exploitation incident investigation.

A deployment bash script revealed the attacker’s infrastructure particulars, together with command and management server addresses, authentication tokens, and a disabled TLS configuration.

Shopper-server mannequin (Supply – Ontinue)

The script contained naturally written Chinese language-language standing messages, suggesting a local speaker authored it.

Considerably, the menace actors managed to compromise tons of of endpoints utilizing this method, demonstrating the size of the menace.

The Menace Actor’s Deployment Technique

The attacker’s strategy demonstrates refined operational tradecraft. The bash script included configuration parameters pointing to a C2 server hosted on Alibaba Cloud providers at IP tackle 47.79.42.91, geolocalised to Japan.

Set up occurred silently heading in the right direction techniques, with detection solely triggering when attackers executed instructions by way of the agent. Ontinue researchers accessed the menace actor’s dashboard in a sandbox atmosphere, discovering the complete scope of compromised infrastructure.

Agent course of (Supply – Ontinue)

What makes Nezha notably harmful is that when deployed, the agent runs with SYSTEM privileges on Home windows and root entry on Linux.

This happens as a result of the agent requires elevated permissions to learn system metrics and handle processes.

When attackers request terminal periods, inherited course of context ensures shell entry operates with full administrative capabilities. This eliminates any privilege escalation necessities which may in any other case alert defenders.

The legit binary achieved zero detections throughout 72 safety distributors on VirusTotal as a result of it genuinely is legit software program pointed at attacker infrastructure. Detection evasion turns into trivial when the precise binary comprises no malicious code, solely misconfigured C2 endpoints.

File administration, command execution, and interactive terminal capabilities present full post-compromise management with out requiring extra instruments or customized payload growth.

Organisations ought to instantly hunt for Nezha presence and implement behavioural monitoring to establish suspicious terminal exercise and file operations indicating compromise.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Access, Actors, Monitoring, Nezha, Remote, Threat, Tool, Trojan, Weaponizing

Post navigation

Previous Post: CISA Adds Digiever Authorization Vulnerability to KEV List Following Active Exploitation
Next Post: U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

Related Posts

DoJ Seizes .8 Million in Crypto From Zeppelin Ransomware Operators DoJ Seizes $2.8 Million in Crypto From Zeppelin Ransomware Operators Cyber Security News
Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools Threat Actors Using Fake Notepad++ and 7-zip Websites to Deploy Remote Monitoring Tools Cyber Security News
Beware of Free Video Game Cheats That Delivers Infostealer Malwares Beware of Free Video Game Cheats That Delivers Infostealer Malwares Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News
New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device New SuperCard Malware Using Hacked Android Phones to Relay Data from Users Payment Cards to Attackers Device Cyber Security News
Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News