InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year
Technology

Chinese hackers have been exploiting ArcGIS Server as a backdoor for over a year

October 14, 2025 4 Min Read
Share

For more than a year, Chinese-linked attackers are believed to be behind a new campaign to compromise ArcGIS systems and turn them into backdoors.

According to ReliaQuest, this activity is attributed to a Chinese state-sponsored hacking group. flax typhoonalso tracked as Ethereal Panda and RedJuliett. According to the U.S. government, the company is valued at a publicly traded Beijing-based company known as Integrity Technology Group.

“The group cleverly modified a Java Server Object Extension (SOE) for a geographic mapping application into a functioning web shell,” the cybersecurity firm said in a report shared with The Hacker News. “By gating access using a hard-coded key for exclusive control and embedding it in system backups, we achieved strong long-term persistence that survives a complete system recovery.”

Flax Typhoon is known for practicing “stealth” in its trade by incorporating extensive LotL (Living Off-The Land) techniques and practical keyboarding. This allows the software component to become a vehicle for malicious attacks while simultaneously evading detection.

This attack demonstrates how attackers are increasingly exploiting trusted tools and services to circumvent security measures and gain unauthorized access to victim systems while blending in with regular server traffic.

An “unusually sophisticated attack chain” involved attackers targeting publicly available ArcGIS servers by compromising portal administrator accounts and deploying malicious SOEs.

“The attacker used a standard (JavaSimpleRESTSOE) ArcGIS extension to activate a malicious SOE and invoke REST operations to execute commands on internal servers via a public portal. This made it difficult to identify the attacker’s activities,” ReliaQuest said. “By adding hard-coded keys, Flax Typhoon prevented other attackers or curious administrators from tampering with access.”

See also  Russian hackers create 4,300 fake travel websites to steal hotel guests' payment data

The “web shell” was allegedly used to create a service named “SysBridge” that performs network discovery operations, uploads a renamed SoftEther VPN executable (“bridge.exe”) to the “System32” folder to establish persistence, and automatically starts the binary whenever the server is restarted.

The ‘bridge.exe’ process was found to establish an outbound HTTPS connection to an attacker-controlled IP address on port 443, with the primary purpose of setting up a covert VPN channel to an external server.

“This VPN bridge allows an attacker to extend a target’s local network to a remote location, making it appear as if the attacker is part of the internal network,” researchers Alexa Feminella and James Xiang explained. “This allowed them to bypass network-level monitoring and act like a backdoor allowing for additional lateral movement and theft.”

The attackers are said to have specifically targeted two workstations belonging to IT personnel in order to obtain credentials and further infiltrate the network. Further investigation revealed that the attacker was able to access the administrator account and reset the password.

“This attack highlights not only the creativity and sophistication of attackers, but also the risk that trusted system functionality can be weaponized to evade traditional detection,” the researchers said. “It’s not just about spotting malicious activity, it’s about being aware of how legitimate tools and processes can be manipulated and turned against them.”

Share This Article
Twitter Copy Link
Previous Article FPS reaches its lowest price and is torn apart by the dark ages of Doom FPS reaches its lowest price and is torn apart by the dark ages of Doom
Next Article Landslides and floods cut off 300 communities in Mexico, leaving dozens dead and missing Landslides and floods cut off 300 communities in Mexico, leaving dozens dead and missing

You Might Also Like

Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets
Technology

Shai-Hulud v2 campaign spreads from npm to Maven, exposing thousands of secrets

6 Min Read
Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload
Technology

Fake OSINT and GPT utility GitHub repositories spread PyStoreRAT malware payload

6 Min Read
Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks
Technology

Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks

1 Min Read
Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack
Technology

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

7 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?