InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools
Technology

From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools

November 9, 2025 8 Min Read
Share
From Log4j to IIS, Chinese hackers turn legacy bugs into global spying tools
SHARE

China-affiliated actors are believed to have engaged in cyberattacks targeting U.S. nonprofit organizations with the goal of establishing long-term sustainability as part of a broader campaign targeting U.S. organizations related to or engaged in policy issues.

The organization “actively seeks to influence U.S. government policy on international issues,” according to a report by Broadcom’s Symantec and Carbon Black teams. The attackers were able to gain access to the network for several weeks in April 2025.

The first sign of activity occurred on April 5, 2025 and included CVE-2022-26134 (Atlassian), CVE-2021-44228 (Apache Log4j), CVE-2017-9805 (Apache Struts), CVE-2017-17562 We have detected a mass scanning effort against servers utilizing a variety of known exploits, including: (GoAhead Web Server).

Symantec and Carbon Black told The Hacker News that there is no indication that these exploitation efforts were successful. It is suspected that the attackers ultimately gained initial access through brute force or credential stuffing attacks.

No further action was recorded until April 16th. The attack ran several curl commands to test internet connectivity, and then ran the Windows command-line tool netstat to gather network configuration information. I then set up persistence on the host using a scheduled task.

This task is designed to run a legitimate Microsoft binary “msbuild.exe” to execute an unknown payload, as well as create another scheduled task configured to run every 60 minutes as the highly privileged SYSTEM user.

According to Symantec and Carbon Black, this new task may load and inject unknown code into csc.exe, ultimately establishing communication with a command and control (C2) server at 38.180.83(.)166. The attacker was then observed running a custom loader to unpack and execute an unspecified payload, likely an in-memory remote access Trojan (RAT).

See also  Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

We also observed running a legitimate Vipre AV component (‘vetysafe.exe’) to sideload a DLL loader (‘sbamres.dll’). This component is also said to have been used to sideload DLLs associated with the Deed RAT (aka Snappybee) in previous activity by Salt Typhoon (aka Earth Estries) and attacks by Earth Longzhi, a subcluster of APT41.

“A copy of this malicious DLL has previously been used in attacks associated with China-based attackers known as Space Pirates,” Broadcom said. “A variant of this component with a different file name was also used by the Chinese APT group Kelp (also known as Salt Typhoon) in a separate incident.”

Other tools observed on targeted networks included Dcsync and Imjpuexc. It is unclear how successful the attackers’ attacks were. No additional activities have been registered since April 16, 2025.

Symantec and Carbon Black said: “It is clear from the activity against this victim that the attackers were looking to establish a persistent and stealth presence on the network. The attackers were also very interested in targeting domain controllers, which could potentially spread the infection to many machines on the network.”

“Sharing tools between groups is a long-standing trend among Chinese threat actors, making it difficult to determine which specific group is behind a range of activities.”

The disclosure comes after a security researcher who goes by the online name BartBlaze revealed that Salt Typhoon exploited a security flaw in WinRAR (CVE-2025-8088) to begin an attack chain that sideloaded a DLL responsible for executing shellcode on compromised hosts. The final payload is designed to establish a connection with a remote server (‘mimosa.gleeze(.)com’).

Activities of other Chinese hacking groups

According to the ESET report, China-aligned groups remain active, attacking organizations across Asia, Europe, Latin America, and the United States in order to serve Beijing’s geopolitical priorities. Some notable campaigns include:

  • In July 2025, an attacker codenamed Speccom (also known as IndigoZebra or SMAC) targeted the Central Asian energy sector through phishing emails delivering BLOODALCHEMY variants and custom backdoors such as kidsRAT and RustVoralix.
  • In July 2025, a threat actor codenamed DigitalRecyclers targeted organizations in Europe using an unusual persistence technique by using the Magnifier accessibility tool to gain SYSTEM privileges.
  • Between June and September 2025, an attacker codenamed FamousSparrow targeted government agencies in Latin America (Argentina, Ecuador, Guatemala, Honduras, and Panama) and may have exploited a ProxyLogon flaw in Microsoft Exchange Server to deploy SparrowDoor.
  • From May to September 2025, a threat actor codenamed SinisterEye (also known as LuoYu and Cascade Panda) targeted a Taiwanese company in the defense aviation sector, a US trade organization based in China, a Greek government agency office based in China, and an Ecuadorian government agency using adversarial man-in-the-middle (AitM) attacks against WinDealer (for Windows) and SpyDealer (for Android). They distributed malware such as, and performed hijacking. Genuine software update mechanism.
  • In June 2025, an attacker codenamed PlushDaemon targeted Japanese and multinational companies in Cambodia with AitM poisoning delivering SlowStepper.
See also  Evil malware is set in AI tools to infiltrate global organizations

“PlushDaemon achieves AitM positioning by compromising network devices such as routers and deploying a tool named EdgeStepper, which redirects DNS traffic from the target network to remote DNS servers controlled by the attacker,” ESET said.

“This server responds to queries for domains associated with the software update infrastructure using the IP address of the web server that performs update hijacking and ultimately powers PlushDaemon’s flagship backdoor, SlowStepper.”

Chinese hacking group targets misconfigured IIS servers

In recent months, threat hunters have discovered Chinese-speaking attackers targeting misconfigured IIS servers by using exposed machine keys to install a backdoor called TOLLBOOTH (also known as HijackServer) with SEO cloaking and web shell capabilities.

“REF3927 exploits publicly available ASP.NET machine keys to compromise IIS servers and deploy the TOLLBOOTH SEO cloaking module globally,” Elastic Security Labs researchers said in a report released late last month. According to HarfangLab, the operation infected hundreds of servers around the world, with infections concentrated in India and the United States.

The attack is also characterized by attempts to weaponize initial access to drop the Godzilla web shell, run the GotoHTTP remote access tool, use Mimikatz to harvest credentials, and deploy HIDDENDRIVER, a modified version of the open source rootkit Hidden, to hide the presence of the malicious payload on the infected machine.

REF3927 Attack Patterns and TOLLBOOTH SEO Cloaking Workflow

It’s worth pointing out that this cluster is the latest addition to a long list of Chinese threat actors targeting IIS servers, including GhostRedirector, Operation Rewrite, and UAT-8099, and marks a spike in such activity.

See also  New bug in Oracle E-Business Suite could allow hackers to access data without logging in

“The malicious operators, who use Chinese as their primary language and appear to be leveraging the breach to support search engine optimization (SEO), have discovered that the deployed module provides a persistent, unauthenticated channel that allows any party to remotely execute commands on the affected servers,” the French cybersecurity firm said.

(This article was updated after publication to include responses from Symantec and Carbon Black.)

Share This Article
Twitter Copy Link
Previous Article Get 65% off one of the most realistic and immersive World War II shooters ever, ahead of its ambitious sequel Get 65% off one of the most realistic and immersive World War II shooters ever, ahead of its ambitious sequel
Next Article Los Angeles Police Department did not disclose domestic violence allegations against police officer to state, hearing reveals Los Angeles Police Department did not disclose domestic violence allegations against police officer to state, hearing reveals

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Strela Stealer running detour dog running through a DNS-powered malware factory
Technology

Strela Stealer running detour dog running through a DNS-powered malware factory

8 Min Read
Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies
Technology

Five people plead guilty in US for helping North Korean IT workers infiltrate 136 companies

7 Min Read
Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Technology

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

2 Min Read
Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine
Technology

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?