Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Open-source monitor turns into an off-the-shelf attack beacon
    Security

    Open-source monitor turns into an off-the-shelf attack beacon

    PineapplesUpdateBy PineapplesUpdateOctober 8, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Open-source monitor turns into an off-the-shelf attack beacon
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Open-source monitor turns into an off-the-shelf attack beacon

    Hackers linked to China have quietly turned a benign open-source network monitoring tool into a remote access beacon.

    According to new findings from cybersecurity firm Huntress, attackers used log poisoning and a web shell to install Nezha, a legitimate remote monitoring/management tool (RMM), to deploy Ghost RAT for deep persistence.

    β€œTo our knowledge, this is the first public reporting of Neza being used to facilitate a web compromise,” Huntress researchers Jay Minton, James Northey and Alden Schmidt said in a blog post shared with CSO ahead of its publication on Wednesday. “Analysis of the intrusion revealed that the threat actor potentially compromised over 100 victim machines.”

    The campaign, first detected in August 2025, primarily targeted victims in Taiwan, Japan, South Korea, and Hong Kong.

    Log poisoning

    The adversary’s entry began through an exposed “phpMyAdmin” interface that lacked authentication. Researchers say a DNS change made months ago inadvertently made it publicly accessible coupleOnce inside, he changed the interface language to Simplified Chinese and immediately began issuing SQL commands through the query interface.

    They then abused MariaDB’s general query logging, reconfiguring it to write logs to a .php file within the web directory. In fact, they turned the log file itself into a web shell: SQL queries containing PHP code were recorded and then executed when accessed via HTTP POST. The PHP code mirrors a basic evaluation web shell, commonly known as the China Chopper web shell.

    This “log poisoning” technique allowed attackers to hide in a backdoor amidst normal traffic. After validating the shell, they switched to a different IP address, likely dividing their operations, and went on to issue commands through Antsword’s virtual terminal.

    Antsword is an open-source Chinese web shell management framework (essentially a graphical control panel) for hackers to manage compromised web servers. In this case, it acted as a command station to interact with the China Chopper mounted on the back door.

    Nezha Ride for Ghost Rat

    Along with the web shell, the attackers used AntSword to download two components: “live.exe” (the). nejha agent) and a “config.yml” that points to the attacker-controlled domain. Neza Agent connected back to a management server whose dashboard was running in Russian, presumably to remove attribution.

    Once Neza was activated, the attackers ran an interactive PowerShell session to create Windows Defender exclusions on key system folders. This allowed them to drop and run a Ghost RAT version from “C:\Windows\Cursors”. The RAT executable also installed a persistence mechanism and used a domain generation algorithm (DGA) for command and control (C2).

    Huntress’ analysis revealed that the Ghost RAT implant had a multi-stage loader, dynamic API resolution, and command blocks consistent with China-Nexus APT activities. The team was able to contain the August 2025 incident before the attackers could cause significant damage.

    “Fortunately, Huntress was able to fix the incident by isolating the system and removing the web shell, Nezha agent, and malware before the attacker could accomplish any further objectives,” the researchers said. Huntress published a set of indicators of compromise (IOCs) associated with the intrusion, including the file names and paths for the web shell, Nezha agent, and Ghost RAT payloads. This incident fits a broader 2025 pattern of threat actors abusing legitimate admin and monitoring tools to remain on the network.

    Earlier this year, Symantec (Broadcom) reported fog ransomware operators were using employee monitoring software Cyteca along with other open-source pen-testing tools like GC2 and Adaptix. Last month, researchers also flagged a suspected Chinese firm’s red-teaming tool, “Villager,” which they said was ripe for abuse by hackers.

    Attack Beacon monitor offtheshelf opensource turns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI found a perfect kindle and Prime Day dropped its price at the lowest level.
    Next Article Ganiga to showcase its waste-sorting robot at TechCrunch Disrupt 2025
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    Your Bluetooth headphones may be under attack – here’s what to do next

    January 15, 2026
    Startups

    Samsung’s new 6K monitor can project in 3D without the need for glasses – but this model is more shocking

    December 24, 2025
    Startups

    This simple monitor adjustment is a productivity upgrade I deeply regret not doing sooner.

    December 20, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.