{"id":3151,"date":"2025-10-08T14:56:37","date_gmt":"2025-10-08T14:56:37","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/10\/08\/nezha-tool-used-in-new-cyber-campaign-targeting-web-applications\/"},"modified":"2025-10-08T14:56:37","modified_gmt":"2025-10-08T14:56:37","slug":"nezha-tool-used-in-new-cyber-campaign-targeting-web-applications","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2025\/10\/08\/nezha-tool-used-in-new-cyber-campaign-targeting-web-applications\/","title":{"rendered":"Nezha Tool Used in New Cyber Campaign Targeting Web Applications"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications.<\/p>\n<p>Beginning in August 2025, Huntress analysts traced a sophisticated intrusion that used creative log poisoning\u00a0techniques to implant a PHP web shell, later managed with AntSword and followed by the installation of both the Nezha agent and Ghost RAT malware.<\/p>\n<p>The discovery marks the first public reporting of Nezha being used to facilitate web server compromises. The monitoring and task-management utility, typically employed for legitimate system administration, was repurposed by threat actors linked to China-based infrastructure.\u00a0<\/p>\n<h2>How the Attack Unfolded<\/h2>\n<p>Huntress investigators found that the attackers gained access through a phpMyAdmin panel exposed to the internet.<\/p>\n<p>Using an AWS-hosted IP, they switched the interface language to Simplified Chinese before executing a series of SQL commands. These actions enabled the general query log in MariaDB and directed it to write to a .php file, effectively planting a hidden backdoor within normal log data.<\/p>\n<p>The intruders then controlled the compromised web server using AntSword, downloading a file named \u201clive.exe,\u201d which turned out to be the Nezha agent. Once installed, this agent connected to a command server at c.mid[.]al, allowing remote monitoring and task execution.<\/p>\n<p>\u201cThis incident highlights the requirement to ensure that public-facing applications are patched,\u201d\u00a0Huntress researchers said.<\/p>\n<p>\u201cBy understanding the step-by-step process used by attackers like this, we can better tune our tools.\u201d<\/p>\n<p><em>Read more on web shells: Microsoft: Attackers Actively Compromising On-Prem SharePoint Customers<\/em><\/p>\n<p>Huntress found that more than 100 victim systems were communicating with the attacker\u2019s Nezha dashboard.<\/p>\n<p>Most affected machines were located in Taiwan, Japan, South Korea and Hong Kong. Analysts also noted a small number of infections worldwide, including in the US, India and several European nations.<\/p>\n<p>The attackers utilized Nezha to execute PowerShell commands that disabled Windows Defender scans before deploying \u201cx.exe,\u201d a variant of Ghost RAT.<\/p>\n<p>The malware established persistence under the name \u201cSQLlite\u201d\u00a0and communicated with command-and-control (C2) domains registered through China-linked entities.<\/p>\n<h2>Protective Measures<\/h2>\n<p>Huntress researchers recommended that organizations take several defensive measures to prevent similar intrusions.<\/p>\n<p>These include:<\/p>\n<ul>\n<li>\n<p>Ensuring public-facing applications are patched and hardened<\/p>\n<\/li>\n<li>\n<p>Making sure authentication is required wherever possible, including in test environments<\/p>\n<\/li>\n<li>\n<p>Gaining visibility and detection logic to spot post-exploitation activity such as web shells, suspicious service creation and executables running from unusual directories<\/p>\n<\/li>\n<\/ul>\n<p>Defenders\u00a0must remain alert as threat actors continue to blend legitimate software with malicious intent to evade detection.<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A newly uncovered cyber campaign featuring the open-source tool Nezha has been observed targeting vulnerable web applications. Beginning in August 2025, Huntress analysts traced a sophisticated intrusion that used creative log poisoning\u00a0techniques to implant a PHP web shell, later managed with AntSword and followed by the installation of both the Nezha agent and Ghost RAT<\/p>\n","protected":false},"author":2,"featured_media":3152,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3151","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3151-927459ea-b13a-4182-882c-52b7abcc4cbb-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=3151"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3151\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/3152"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=3151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=3151"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=3151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}