Sunday, May 18, 2025
Homecyber securityChinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors

Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors

Published on

SIEM as a Service

Follow Us on Google News

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-31324, in SAP NetWeaver Visual Composer 7.x is being actively exploited by a Chinese threat actor, tracked as Chaya_004.

This deserialization flaw allows attackers to upload malicious binaries, including web shells, to unpatched servers, granting full system takeover capabilities.

According to research from Forescout, exploitation has been observed since at least April 29, 2025, with scans targeting the vulnerable /developmentserver/metadatauploader endpoint.

- Advertisement - Google News

The attacks have primarily impacted manufacturing environments, where compromised SAP systems could disrupt operations and expose sensitive data.

Critical SAP NetWeaver Flaw

According to the Report, Forescout’s investigation uncovered a sprawling malicious infrastructure linked to Chaya_004, likely operating out of China.

The network includes servers hosted on Chinese cloud providers like Alibaba and Tencent, deploying Supershell-a Go-based reverse shell developed by a Chinese-speaking coder named “tdragon6”-as the primary backdoor.

Additional tools, such as NPS (an intranet penetration proxy), NHAS (a penetration testing toolkit), and Cobalt Strike, were identified across 787 IP addresses with consistent anomalous self-signed certificates mimicking Cloudflare.

Notably, an ELF binary named “config” and a malware sample, svchosts.exe, led researchers to C2 domains and automated penetration testing platforms hosted on IPs like 47.97.42.177 and 8.210.65.56.

Exploitation patterns show attackers using POST requests to deploy web shells with names like helper.jsp or randomized 8-letter variants, often followed by curl commands to fetch additional payloads.

The potential fallout includes service disruption, credential theft, lateral movement to critical SAP components like HANA databases, and regulatory violations under GDPR or HIPAA.

Chaya_004 Infrastructure

Forescout’s analysis suggests opportunistic scans and targeted campaigns, with 37 unique IPs scanning for vulnerable endpoints and 13 IPs attempting exploitation on customer networks.

The latter traced to ASNs like Scaleway (AS12876) and Contabo (AS51167), often abused by threat actors.

SAP released patches in April 2025 for NetWeaver AS Java versions 7.50–7.52, and organizations are urged to apply them immediately.

Additional mitigations include restricting access to metadata uploader services, disabling non-essential Visual Composer instances, and monitoring for anomalous activity outside maintenance windows.

Forescout has enhanced its OT/eyeInspect, eyeFocus, and eyeAlert platforms with detection logic, threat intelligence integration, and real-time alerting to combat this threat.

Indicators of Compromise (IoCs)

Below are key IoCs associated with CVE-2025-31324 exploitation, as provided by Forescout Vedere Labs:

IoCDescription
47.97.42.177Initial SuperShell host
49.232.93.226Malware distribution node
8.210.65.56Automated pentest platform
search-email[.]comC2 domain
888e953538ff668104f838120bc4d801c41adb07027db16281402a62f6ec29efConfig ELF binary hash
f1e505fe96b8f83c84a20995e992b3794b1882df4954406e227bd7b75f13c779svchosts.exe malware hash

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...