By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
Tech News

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

By Viral Trending Content 5 Min Read
Share
SHARE

May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southeast Asia since 2023.

“The threat actor mainly targets the SQL injection vulnerabilities discovered on web applications to access the SQL servers of targeted organizations,” Trend Micro security researcher Joseph C Chen said in an analysis published this week. “The actor also takes advantage of various known vulnerabilities to exploit public-facing servers.”

Some of the other prominent targets of the adversarial collective include Indonesia, Malaysia, the Philippines, Thailand, and Vietnam.

The cybersecurity company is tracking the activity under the moniker Earth Lamia, stating the activity shares some degree of overlap with threat clusters documented by Elastic Security Labs as REF0657, Sophos as STAC6451, and Palo Alto Networks Unit 42 as CL-STA-0048.

Cybersecurity

Each of these attacks has targeted organizations spanning multiple sectors in South Asia, often leveraging internet-exposed Microsoft SQL Servers and other instances to conduct reconnaissance, deploy post-exploitation tools like Cobalt Strike and Supershell, and establish proxy tunnels to the victim networks using Rakshasa and Stowaway.

Also used are privilege escalation tools like GodPotato and JuicyPotato; network scanning utilities such as Fscan and Kscan; and legitimate programs like wevtutil.exe to clean Windows Application, System, and Security event logs.

Select intrusions aimed at Indian entities have also attempted to deploy Mimic ransomware binaries to encrypt victim files, although the efforts were largely unsuccessful.

“While the actors were seen staging the Mimic ransomware binaries in all observed incidents, the ransomware often did not successfully execute, and in several instances, the actors were seen attempting to delete the binaries after being deployed,” Sophos noted in an analysis published in August 2024.

Then earlier this month, EclecticIQ disclosed that CL-STA-0048 was one among the many China-nexus cyber espionage groups to exploit CVE-2025-31324, a critical unauthenticated file upload vulnerability in SAP NetWeaver to establish a reverse shell to infrastructure under its control.

Besides CVE-2025-31324, the hacking crew is said to have weaponized as many as eight different vulnerabilities to breach public-facing servers –

Describing it as “highly active,” Trend Micro noted that the threat actor has shifted its focus from financial services to logistics and online retail, and most recently, to IT companies, universities, and government organizations.

Cybersecurity

“In early 2024 and prior, we observed that most of their targets were organizations within the financial industry, specifically related to securities and brokerage,” the company said. “In the second half of 2024, they shifted their targets to organizations mainly in the logistics and online retail industries. Recently, we noticed that their targets have shifted again to IT companies, universities, and government organizations.”

A noteworthy technique adopted by Earth Lamia is to launch its custom backdoors like PULSEPACK via DLL side-loading, an approach widely embraced by Chinese hacking groups. A modular .NET-based implant, PULSEPACK communicates with a remote server to retrieve various plugins to carry out its functions.

Trend Micro said it observed in March 2025 an updated version of the backdoor that changes the command-and-control (C2) communication method from TCP to WebSocket, indicating active ongoing development of the malware.

“Earth Lamia is conducting its operations across multiple countries and industries with aggressive intentions,” it concluded. “At the same time, the threat actor continuously refines their attack tactics by developing custom hacking tools and new backdoors.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Samsung Galaxy S26 FE Seen Running One UI 9

Can OpenAI’s ‘Master of Disaster’ Fix AI’s Reputation Crisis?

Trinity College Dublin student wins 2026 Mary Mulvihill Award

Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

Samsung Galaxy Z Fold 8 vs Z Fold 8 Wide: Which to Buy?

TAGGED: Cyber Security, Cybersecurity, Internet, Malware, Microsoft, NetWeaver, Ransomware, Remote Code Execution, SAP, SQL Injection, SQL Server, Threat Intelligence, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Elden Ring Nightreign’s Patch 1.02 Arrives Next Week, Increases Runes Gained in Solo Expeditions
Next Article Bitcoin Indicator Shows Bears Dominate Market With Rising Volume – Details
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Rahul Shah bullish on pharma, sees Sun Pharma and Aurobindo as key large-cap plays
Business
Samsung Galaxy S26 FE Seen Running One UI 9
Tech News
One in a thousand: The European countries where the ultra-rich earn the most
Business
Coinbase premium hits monthly low as institutional selling pressure mounts
Crypto
Square Enix reveals new details about The Adventures of Elliot's earliest era
Gaming News
Where to travel for accessible adventures in Europe, according to the experts
Travel
Can OpenAI’s ‘Master of Disaster’ Fix AI’s Reputation Crisis?
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Brussels unveils plans for a European Degree but struggles to explain why

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
CISA urges software devs to weed out SQL injection vulnerabilities
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?