InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025 4 Min Read
Share
Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
SHARE

For more than a year, Chinese-linked attackers are believed to be behind a new campaign to compromise ArcGIS systems and turn them into backdoors.

According to ReliaQuest, this activity is attributed to a Chinese state-sponsored hacking group. flax typhoonalso tracked as Ethereal Panda and RedJuliett. According to the U.S. government, the company is valued at a publicly traded Beijing-based company known as Integrity Technology Group.

“The group cleverly modified a Java Server Object Extension (SOE) for a geographic mapping application into a functioning web shell,” the cybersecurity firm said in a report shared with The Hacker News. “By gating access using a hard-coded key for exclusive control and embedding it in system backups, we achieved strong long-term persistence that survives a complete system recovery.”

Flax Typhoon is known for practicing “stealth” in its trade by incorporating extensive LotL (Living Off-The Land) techniques and practical keyboarding. This allows the software component to become a vehicle for malicious attacks while simultaneously evading detection.

This attack demonstrates how attackers are increasingly exploiting trusted tools and services to circumvent security measures and gain unauthorized access to victim systems while blending in with regular server traffic.

An “unusually sophisticated attack chain” involved attackers targeting publicly available ArcGIS servers by compromising portal administrator accounts and deploying malicious SOEs.

“The attacker used a standard (JavaSimpleRESTSOE) ArcGIS extension to activate a malicious SOE and invoke REST operations to execute commands on internal servers via a public portal. This made it difficult to identify the attacker’s activities,” ReliaQuest said. “By adding hard-coded keys, Flax Typhoon prevented other attackers or curious administrators from tampering with access.”

See also  Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media

The “web shell” was allegedly used to create a service named “SysBridge” that performs network discovery operations, uploads a renamed SoftEther VPN executable (“bridge.exe”) to the “System32” folder to establish persistence, and automatically starts the binary whenever the server is restarted.

The ‘bridge.exe’ process was found to establish an outbound HTTPS connection to an attacker-controlled IP address on port 443, with the primary purpose of setting up a covert VPN channel to an external server.

“This VPN bridge allows an attacker to extend a target’s local network to a remote location, making it appear as if the attacker is part of the internal network,” researchers Alexa Feminella and James Xiang explained. “This allowed them to bypass network-level monitoring and act like a backdoor allowing for additional lateral movement and theft.”

The attackers are said to have specifically targeted two workstations belonging to IT personnel in order to obtain credentials and further infiltrate the network. Further investigation revealed that the attacker was able to access the administrator account and reset the password.

“This attack highlights not only the creativity and sophistication of attackers, but also the risk that trusted system functionality can be weaponized to evade traditional detection,” the researchers said. “It’s not just about spotting malicious activity, it’s about being aware of how legitimate tools and processes can be manipulated and turned against them.”

Share This Article
Twitter Copy Link
Previous Article FPS reaches its lowest price and is torn apart by the dark ages of Doom FPS reaches its lowest price and is torn apart by the dark ages of Doom
Next Article Landslides and floods cut off 300 communities in Mexico, leaving dozens dead and missing Landslides and floods cut off 300 communities in Mexico, leaving dozens dead and missing

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices
Technology

Experts report a surge in automated botnet attacks targeting PHP servers and IoT devices

5 Min Read
Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Technology

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

2 Min Read
comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Technology

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

5 Min Read
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up
Technology

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?