InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025 4 Min Read
Share
Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
SHARE

For more than a year, Chinese-linked attackers are believed to be behind a new campaign to compromise ArcGIS systems and turn them into backdoors.

According to ReliaQuest, this activity is attributed to a Chinese state-sponsored hacking group. flax typhoonalso tracked as Ethereal Panda and RedJuliett. According to the U.S. government, the company is valued at a publicly traded Beijing-based company known as Integrity Technology Group.

“The group cleverly modified a Java Server Object Extension (SOE) for a geographic mapping application into a functioning web shell,” the cybersecurity firm said in a report shared with The Hacker News. “By gating access using a hard-coded key for exclusive control and embedding it in system backups, we achieved strong long-term persistence that survives a complete system recovery.”

Flax Typhoon is known for practicing “stealth” in its trade by incorporating extensive LotL (Living Off-The Land) techniques and practical keyboarding. This allows the software component to become a vehicle for malicious attacks while simultaneously evading detection.

This attack demonstrates how attackers are increasingly exploiting trusted tools and services to circumvent security measures and gain unauthorized access to victim systems while blending in with regular server traffic.

An “unusually sophisticated attack chain” involved attackers targeting publicly available ArcGIS servers by compromising portal administrator accounts and deploying malicious SOEs.

“The attacker used a standard (JavaSimpleRESTSOE) ArcGIS extension to activate a malicious SOE and invoke REST operations to execute commands on internal servers via a public portal. This made it difficult to identify the attacker’s activities,” ReliaQuest said. “By adding hard-coded keys, Flax Typhoon prevented other attackers or curious administrators from tampering with access.”

See also  Experts warn of widespread SonicWall VPN breach affecting over 100 accounts

The “web shell” was allegedly used to create a service named “SysBridge” that performs network discovery operations, uploads a renamed SoftEther VPN executable (“bridge.exe”) to the “System32” folder to establish persistence, and automatically starts the binary whenever the server is restarted.

The ‘bridge.exe’ process was found to establish an outbound HTTPS connection to an attacker-controlled IP address on port 443, with the primary purpose of setting up a covert VPN channel to an external server.

“This VPN bridge allows an attacker to extend a target’s local network to a remote location, making it appear as if the attacker is part of the internal network,” researchers Alexa Feminella and James Xiang explained. “This allowed them to bypass network-level monitoring and act like a backdoor allowing for additional lateral movement and theft.”

The attackers are said to have specifically targeted two workstations belonging to IT personnel in order to obtain credentials and further infiltrate the network. Further investigation revealed that the attacker was able to access the administrator account and reset the password.

“This attack highlights not only the creativity and sophistication of attackers, but also the risk that trusted system functionality can be weaponized to evade traditional detection,” the researchers said. “It’s not just about spotting malicious activity, it’s about being aware of how legitimate tools and processes can be manipulated and turned against them.”

Share This Article
Twitter Copy Link
Previous Article FPS reaches its lowest price and is torn apart by the dark ages of Doom FPS reaches its lowest price and is torn apart by the dark ages of Doom
Next Article Landslides and floods cut off 300 communities in Mexico, leaving dozens dead and missing Landslides and floods cut off 300 communities in Mexico, leaving dozens dead and missing

Latest News

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

The North Korean threat actors behind the Contagious Interview campaign…

November 29, 2025

You Might Also Like

The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks
Technology

The FBI warns UNC6040 and UNC6395 targeting Salesforce platforms in data theft attacks

5 Min Read
X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

2 Min Read
Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages
Technology

Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages

5 Min Read
Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies
Technology

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies

7 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?