China-affiliated hackers have quietly turned a once-benign open-source community monitoring instrument right into a distant entry beacon.
In accordance with new findings from cybersecurity agency Huntress, the attackers used log poisoning and an online shell to put in Nezha, a respectable distant monitoring/administration instrument (RMM), as a foothold to deploy Ghost RAT for deeper persistence.
“To our information, that is the primary public reporting of Nezha getting used to facilitate net compromises,” Huntress researchers Jai Minton, James Northey, and Alden Schmidt, stated in a weblog submit shared with CSO forward of its publication on Wednesday. “Evaluation of the intrusion revealed the risk actor had seemingly compromised greater than 100 sufferer machines.”
The marketing campaign, first detected in August 2025, primarily focused victims from Taiwan, Japan, South Korea, and Hong Kong.
Sneaking in by means of log poisoning
The adversary’s entry started by means of an uncovered “phpMyAdmin” interface that lacked authentication. A DNS change months earlier had inadvertently made it publicly accessible, the researchers added. As soon as inside, they switched the interface language to Simplified Chinese language and instantly started issuing SQL instructions through the question interface.
They then abused MariaDB’s normal question logging, reconfiguring it to put in writing logs right into a .php file throughout the net listing. In impact, they turned the log file itself into an online shell: SQL queries containing PHP code had been recorded after which executed when accessed through HTTP POST. The PHP code mirrored a fundamental analysis net shell, generally known as the China Chopper net shell.
This “Log Poisoning” method allowed the attackers to cover the backdoor amongst regular visitors. After validating the shell, they switched to a unique IP handle, prone to compartmentalize their operations, and moved to difficulty instructions through AntSword’s digital terminal.
AntSword is an open-source Chinese language net shell administration framework (primarily a graphical management panel) for hackers to handle compromised net servers. On this case, it labored as a command station to work together with the planted backdoor China Chopper.
Driving Nezha to Ghost RAT
With the online shell in place, the attackers used AntSword to obtain two elements: “dwell.exe” (the Nezha agent) and a “config.yml” that pointed to the attacker-controlled area. The Nezha agent related again to a administration server whose dashboard was working in Russian, presumably to throw off attribution.
As soon as Nezha was energetic, the attackers ran an interactive PowerShell session to create Home windows Defender exclusions on key system folders. This allowed them to drop and run a Ghost RAT variant from “C:WindowsCursors”. The RAT executable additionally put in a persistence mechanism and used a website era algorithm (DGA) for command & management (C2).
Huntress’ evaluation confirmed the Ghost RAT implant had a multi-stage loader, dynamic API decision, and command blocks per China-nexus APT actions. The staff was in a position to comprise the August 2025 incident earlier than attackers might trigger vital injury.
“Luckily, Huntress was in a position to isolate the system and remediate the incident by eradicating the online shell, Nezha agent, and malware earlier than the attacker might perform any additional goals,” the researchers added. Huntress revealed a set of indicators of compromise (IOCs) tied to the intrusion, together with the file identify and path for the online shell, Nezha agent, and the Ghost RAT Payload. This incident matches a broader 2025 sample of risk actors abusing respectable admin and monitoring instruments for persistence on networks.
Earlier this yr, Symantec (Broadcom) reported Fog ransomware operators utilizing worker monitoring software program Syteca alongside different open-source pen-testing instruments like GC2 and Adaptix. Final month, researchers additionally flagged a red-teaming instrument, “Villager,” from a shadowy Chinese language agency that they stated was ripe for hackers to abuse.



