InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks
Technology

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

May 30, 2025 4 Min Read
Share
China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks
SHARE

China-related threat actors behind recent wild exploitation in SAP NetWeaver have been attributed to a broader set of attacks targeting organizations in Brazil, India and Southeast Asia since 2023.

“Threat actors are primarily targeted at accessing the target organization’s SQL servers by targeting SQL injection vulnerabilities discovered in web applications,” said Joseph C Chen of Trend Micro Security Researcher in an analysis published this week. “The actors are also leveraging a variety of known vulnerabilities to leverage public servers.”

Other prominent targets of hostile groups include Indonesia, Malaysia, the Philippines, Thailand and Vietnam.

Cybersecurity companies track activities under Monica Earth LamiaActivities share some overlap with threat clusters documented by Elastic Security Lab as Ref0657, Stac6451, and the threat clusters documented by Palo Alto Networks Unit 42 as CL-STA-0048.

Each of these attacks targets organizations across multiple sectors in South Asia, often leveraging Microsoft SQL servers and other instances exposed to the internet to conduct reconnaissance, deploying post-extracted tools such as Cobalt Strike and Supershell, and using Laksasa and Stowway to establish proxy tunnels in the victim network.

Privileged escalation tools such as Godpotato and Juicypotato are also used. Network scanning utilities such as FSCAN and KSCAN. Legitimate programs like Wevtutil.exe clean Windows applications, systems, and security event logs.

The selected intrusion targeting Indian entities attempted to deploy Mimic Ransomware binaries to encrypt the victim files, but the efforts were largely unsuccessful.

“I saw actors stage the binaries of mimic ransomware in all observed cases, but ransomware often didn’t run properly, and in some instances the actors were trying to remove the binaries after deployment,” Sophos said in an analysis released in August 2024.

See also  Build an infrastructure for effective atmosphere coding in the enterprise

Then, earlier this month, EclecticiQ revealed that CL-STA-0048 is one of many Chinese and Nexus cyberspy groups that exploit CVE-2025-31324.

In addition to CVE-2025-31324, the hacking crew is said to have weaponized eight different vulnerabilities to violate public-facing servers –

Describing “very active,” Trend Micro noted that threat actors have shifted their focus from financial services to logistics and online retail and, more recently, to IT companies, universities and government organizations.

“We observed at the beginning and before 2024 that most of their goals were organizations within the financial industry, particularly related to securities and intermediaries,” the company said. “In late 2024, they shifted their goals to organizations primarily in the logistics and online retail industry. Recently, they noticed that Target has moved again to IT companies, universities and government organizations.”

A notable technique adopted by Earth Lamia is launching custom backdoors like PulsePack via DLL sideloads. This is a widely accepted approach among Chinese hacking groups. PulsePack, a modular .NET-based implant, communicates with remote servers to retrieve various plugins and perform functions.

Trend Micro said in March 2025 that it observed an updated version of the backdoor that changes command and control (C2) communication methods from TCP to WebSocket, indicating the aggressive ongoing development of malware.

“Earth Lamia is active in business in multiple countries and industries with a positive intention,” he concluded. “At the same time, threat actors will continuously improve their offensive tactics by developing custom hacking tools and new backdoors.”

Share This Article
Twitter Copy Link
Previous Article Optimally cultivate garden stock tracker discrepancies Optimally cultivate garden stock tracker discrepancies
Next Article mm A new research paper questions the price of “tokens” in AI chat

Latest News

mm

AI and national security: a new battlefield

Artificial intelligence is changing the way nations protect themselves. It…

June 12, 2025
Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

Zero-click AI vulnerability exposes Microsoft 365 Copilot data without user interaction

A new attack technology named Echoleak is characterized as a…

June 12, 2025
mm

Evogene and Google Cloud unveils basic models for the design of generative molecules, pioneering a new era of life science.

Evogene Ltd. has announced beginners in the class Generated AI…

June 11, 2025
Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Interpol dismantles over 20,000 malicious IPS linked to 69 running malware variants.

Wednesday Interpol announced the dismantling of over 20,000 malicious IP…

June 11, 2025
mm

“Secure” images are not difficult to steal with AI.

New research suggests that watermarking tools aimed at blocking AI…

June 10, 2025

You Might Also Like

Fake WhatsApp, Chinese Android phones shipped with Telegram app targeting Crypto users
Technology

Fake WhatsApp, Chinese Android phones shipped with Telegram app targeting Crypto users

5 Min Read
mm
Technology

AI inference scale inference: Exploring the high-performance architecture of Nvidia Dynamo

9 Min Read
The attacker warning Fortinet holds a Patchative Patching Patchate via SSL-VPN Symlink Exploit
Technology

The attacker warning Fortinet holds a Patchative Patching Patchate via SSL-VPN Symlink Exploit

4 Min Read
Meta starts the llamafirewall framework and stops AI jailbreak, injection, and safe code
Technology

Meta starts the llamafirewall framework and stops AI jailbreak, injection, and safe code

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?