Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year

Posted on October 14, 2025October 14, 2025 By CWS

Oct 14, 2025Ravie LakshmananCyber Espionage / Community Safety
Risk actors with ties to China have been attributed to a novel marketing campaign that compromised an ArcGIS system and turned it right into a backdoor for greater than a yr.
The exercise, per ReliaQuest, is the handiwork of a Chinese language state-sponsored hacking group referred to as Flax Hurricane, which can also be tracked as Ethereal Panda and RedJuliett. In accordance with the U.S. authorities, it is assessed to be a publicly-traded, Beijing-based firm often known as Integrity Expertise Group.
“The group cleverly modified a geo-mapping utility’s Java server object extension (SOE) right into a functioning internet shell,” the cybersecurity firm mentioned in a report shared with The Hacker Information. “By gating entry with a hardcoded key for unique management and embedding it in system backups, they achieved deep, long-term persistence that would survive a full system restoration.”

Flax Hurricane is understood for residing as much as the “stealth” in its tradecraft by extensively incorporating living-off-the-land (LotL) strategies and hands-on keyboard exercise, thereby turning software program elements into automobiles for malicious assaults, whereas concurrently evading detection.
The assault demonstrates how attackers more and more abuse trusted instruments and providers to bypass safety measures and acquire unauthorized entry to victims’ techniques, on the similar time mixing in with regular server visitors.

The “unusually intelligent assault chain” concerned the menace actors concentrating on a public-facing ArcGIS server by compromising a portal administrator account to deploy a malicious SOE.
“The attackers activated the malicious SOE utilizing a regular [JavaSimpleRESTSOE] ArcGIS extension, invoking a REST operation to run instructions on the interior server by way of the general public portal—making their exercise tough to identify,” ReliaQuest mentioned. “By including a hard-coded key, Flax Hurricane prevented different attackers, and even curious admins, from tampering with its entry.”
The “internet shell” is alleged to have been used to run community discovery operations, set up persistence by importing a renamed SoftEther VPN executable (“bridge.exe”) to the “System32” folder, after which making a service named “SysBridge” to robotically begin the binary each time the server is rebooted.
The “bridge.exe” course of has been discovered to determine outbound HTTPS connections to an attacker-controlled IP deal with on port 443 with the first objective of organising a covert VPN channel to the exterior server.

“This VPN bridge permits the attackers to increase the goal’s native community to a distant location, making it seem as if the attacker is a part of the interior community,” researchers Alexa Feminella and James Xiang defined. “This allowed them to bypass network-level monitoring, appearing like a backdoor that permits them to conduct further lateral motion and exfiltration.”
The menace actors are mentioned to have particularly focused two workstations belonging to IT personnel to be able to receive credentials and additional burrow into the community. Additional investigation has uncovered that the adversary had entry to the executive account and was capable of reset the password.
“This assault highlights not simply the creativity and class of attackers but additionally the hazard of trusted system performance being weaponized to evade conventional detection,” the researchers famous. “It is not nearly recognizing malicious exercise; it is about recognizing how legit instruments and processes could be manipulated and turned towards you.”

The Hacker News Tags:ArcGIS, Backdoor, Chinese, Exploit, Hackers, Server, Year

Post navigation

Previous Post: Hackers Mimic as OpenAI and Sora Services to Steal Login Credentials
Next Post: Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks

Related Posts

Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server The Hacker News
Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack The Hacker News
Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware Russian Hackers Using ClickFix Fake CAPTCHA to Deploy New LOSTKEYS Malware The Hacker News
Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways The Hacker News
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk The Hacker News
OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News