By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware
Tech News

Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware

By admin 4 Min Read
Share
SHARE

Hackers were spotted exploiting a critical SAP NetWeaver vulnerability tracked as CVE-2025-31324 to deploy the Auto-Color Linux malware in a cyberattack on a U.S.-based chemicals company.

Cybersecurity firm Darktrace discovered the attack during an incident response in April 2025, where an investigation revealed that the Auto-Color malware had evolved to include additional advanced evasion tactics.

Darktrace reports that the attack started on April 25, but active exploitation occurred two days later, delivering an ELF (Linux executable) file onto the targeted machine.

The Auto-Color malware was first documented by Palo Alto Networks’ Unit 42 researchers in February 2025, who highlighted its evasive nature and difficulty in eradicating once it has established a foothold on a machine.

The backdoor adjusts its behavior based on the user privilege level it runs from, and uses ‘ld.so.preload’ for stealthy persistence via shared object injection.

Auto-Color features capabilities such as arbitrary command execution, file modification, reverse shell for full remote access, proxy traffic forwarding, and dynamic configuration updating. It also has a rootkit module that hides its malicious activities from security tools.

Unit 42 could not discover the initial infection vector from the attacks it observed, targeting universities and government organizations in North America and Asia.

According to the latest research by Darktrace, the threat actors behind Auto-Color exploit CVE-2025-31324, a critical vulnerability in NetWeaver that allows unauthenticated attackers to upload malicious binaries to achieve remote code execution (RCE).

Timeline of the observed attack
<strong>Timeline of the observed attack</strong><br /><em>Source: Darktrace</em>

SAP fixed the flaw in April 2025, while security firms ReliaQuest, Onapsis, and watchTowr reported seeing active exploitation attempts, which culminated only a few days later.

By May, ransomware actors and Chinese state hackers had joined in the exploitation activity, while Mandiant reported unearthing evidence of zero-day exploitation for CVE-2025-31324 since at least mid-March 2025.

Apart from the initial access vector, Darktrace also discovered a new evasion measure implemented on the latest version of Auto-Color.

If Auto-Color cannot connect to its hardcoded Command-and-Control (C2) server, it suppresses most of its malicious behavior. This applies to sandboxed and air-gapped environments, where the malware would appear benign to analysts.

“If the C2 server is unreachable, Auto-Color effectively stalls and refrains from deploying its full malicious functionality, appearing benign to analysts,” explains Darktrace.

“This behavior prevents reverse engineering efforts from uncovering its payloads, credential harvesting mechanisms, or persistence techniques.”

This is added on top of what Unit 42 documented previously, including privilege-aware execution logic, use of benign filenames, hooking libc functions, use of a fake logs directory, C2 connections over TLS, unique hashes for each sample, and the existence of a “kill switch.”

With Auto-Color now actively exploiting CVE-2025-31324, administrators should act quickly to apply the security updates or mitigations provided in the customer-only SAP bulletin.

Wiz

CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value.

This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

You Might Also Like

Purple Promo Codes and Deals: Up to 30% Off

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

Optimism at 10-year high, as Europe’s technology sector hits $4trn mark

Honor 500 Release Date Announced as Specs Leak

What to Expect from Apple’s AirPods Pro 4 in 2026

TAGGED: Actively Exploited, Auto-Color, Evasion, Initial Access, Linux, Malware, SAP, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Lawyers for Epstein’s former girlfriend say she’s open to interview with Congress, if given immunity
Next Article ChatGPT’s Study Mode Is Here. It Won’t Fix Education’s AI Problems
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Next 1000x Crypto News Live Today: Early Alpha on the Latest Crypto Gems (November 19)
Crypto
See How Home Insurance Premiums Are Changing Near You
World News
Chinese astronauts left stranded after space debris smashes return craft
World News
Will the stock market crash before Christmas?
Business
Purple Promo Codes and Deals: Up to 30% Off
Tech News
Malaysia cracks down on crypto power theft as bitcoin mining drains the grid
Crypto
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Tech News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Next 1000x Crypto News Live Today: Early Alpha on the Latest Crypto Gems (November 19)

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Next 1000x Crypto News Live Today: Early Alpha on the Latest Crypto Gems (November 19)
November 19, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?