Skip to main content

China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures

Medium
Published: Wed May 14 2025 (05/14/2025, 17:09:50 UTC)
Source: AlienVault OTX

Description

A report from EclecticIQ on a China-Nexus nation-state cyber-espionage campaign against SAP NetWeaver reveals details of Chinese-speaking attackers' operations and how they target high-value networks.

AI-Powered Analysis

AILast updated: 06/19/2025, 17:49:22 UTC

Technical Analysis

The threat involves a cyber-espionage campaign attributed to China-Nexus nation-state actors exploiting a vulnerability identified as CVE-2023-46747 (also referenced as CVE-2025-31324) in SAP NetWeaver, a widely used enterprise application platform. SAP NetWeaver is critical infrastructure software that supports business processes and data management for many large organizations globally, including in Europe. The attackers leverage this vulnerability to deploy webshells such as 'vshell' and 'snowlight', enabling persistent remote access and control over compromised systems. The campaign is characterized by the use of advanced malware loaders like 'krustyloader' and command and control frameworks such as 'sliver'. Techniques observed include network reconnaissance (T1016), spear-phishing (T1566), credential dumping (T1140), process injection or masquerading (T1036), and command execution (T1059), indicating a sophisticated multi-stage attack chain aimed at infiltrating and maintaining access within high-value networks. The attackers specifically target critical infrastructure sectors, which are vital for national security and economic stability. Although no known exploits are currently observed in the wild, the presence of detailed technical indicators and the involvement of a nation-state adversary suggest a high likelihood of exploitation attempts. The campaign also involves attempts to compromise Azure Active Directory environments, indicating a focus on cloud-integrated enterprise environments. The lack of affected version details and patch information suggests that organizations may be unaware or unprepared for this threat, increasing the risk of successful exploitation.

Potential Impact

For European organizations, particularly those operating critical infrastructure such as energy, transportation, telecommunications, and government services, this threat poses significant risks. Successful exploitation can lead to unauthorized access to sensitive data, disruption of essential services, and potential manipulation or sabotage of operational technology systems. The compromise of SAP NetWeaver environments can result in data exfiltration, intellectual property theft, and long-term persistence within networks, undermining confidentiality, integrity, and availability. Given the integration of SAP systems in many European enterprises, the impact extends to financial losses, reputational damage, regulatory penalties under GDPR, and potential national security implications. The targeting of Azure AD environments further increases the risk of lateral movement and escalation within hybrid cloud infrastructures common in Europe. The medium severity rating may underestimate the potential cascading effects on critical services if exploited at scale or combined with other attack vectors.

Mitigation Recommendations

Organizations should prioritize the following specific actions: 1) Conduct immediate security assessments of SAP NetWeaver deployments to identify any unauthorized webshells or suspicious activity, leveraging threat intelligence from sources such as EclecticIQ. 2) Implement strict network segmentation to isolate SAP systems from general IT and operational technology networks, reducing lateral movement opportunities. 3) Enhance monitoring for indicators of compromise related to known tools like 'vshell', 'snowlight', and 'krustyloader', including unusual process executions and network traffic patterns. 4) Harden Azure AD configurations by enforcing multi-factor authentication, conditional access policies, and continuous audit logging to detect anomalous access attempts. 5) Apply principle of least privilege to SAP and cloud accounts, regularly reviewing permissions and disabling unused accounts. 6) Develop and test incident response plans specifically addressing SAP-related breaches and nation-state threat scenarios. 7) Engage with SAP security advisories and vendors to obtain patches or mitigations as they become available, and consider deploying virtual patching or compensating controls in the interim. 8) Conduct targeted user awareness training to reduce the risk of spear-phishing, a common initial attack vector. These measures go beyond generic advice by focusing on the unique aspects of SAP NetWeaver exploitation and the specific tools and tactics used by China-Nexus actors.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures"]
Adversary
China-Nexus

Indicators of Compromise

Ip

ValueDescriptionCopy
ip185.165.169.31
CC=RO ASN=AS200651 flokinet ltd
ip43.247.135.53
CC=HK ASN=ASNone
ip46.29.161.198
CC=RU ASN=AS51659 llc baxet
ip107.175.77.118
CC=US ASN=AS36352 colocrossing
ip149.62.46.132
CC=US ASN=AS8888 llc it-service
ip153.92.4.236
CC=SG ASN=AS47583 hostinger international limited
ip192.243.115.175
CC=US ASN=AS25820 it7 networks inc
ip23.227.196.204
CC=US ASN=AS29802 hivelocity inc.
ip52.172.31.130
CC=IN ASN=AS8075 microsoft corporation
ip103.30.76.206
CC=HK ASN=AS58985 sunday network (hong kong) ltd
ip107.174.81.24
CC=US ASN=AS36352 colocrossing
ip130.185.118.247
CC=DE ASN=AS51167 contabo gmbh
ip138.197.40.133
CC=US ASN=AS14061 digitalocean llc
ip138.68.61.82
CC=US ASN=AS14061 digitalocean llc
ip141.164.35.53
CC=KR ASN=AS20473 the constant company llc
ip142.202.4.28
CC=US ASN=AS62838 reprise hosting
ip15.204.56.106
CC=US ASN=AS16276 ovh sas
ip154.37.221.237
CC=US ASN=AS63339 vlayer inc.
ip156.238.224.227
CC=US ASN=AS35916 multacom corporation
ip159.65.34.242
CC=US ASN=AS14061 digitalocean llc
ip162.248.53.119
CC=US ASN=AS27640 gigas hosting usa llc
ip184.174.96.39
CC=US ASN=AS21769 colocation america corporation
ip185.143.222.215
CC=US ASN=AS49392 llc baxet
ip196.251.85.31
CC=NG ASN=ASNone
ip206.237.1.201
CC=US ASN=AS139640 hk new cloud technology limited
ip208.76.55.39
CC=US ASN=AS47869 ellada projects b.v. trading as netrouting
ip212.11.64.225
CC=CH ASN=AS30823 combahton gmbh
ip212.192.15.213
CC=RU ASN=AS49392 llc baxet
ip215.204.56.106
CC=US ASN=AS749 dod network information center
ip23.95.123.5
CC=US ASN=AS36352 colocrossing
ip27.25.148.183
CC=CN ASN=AS4134 chinanet
ip45.155.222.14
CC=GB ASN=AS8796 kurun cloud inc
ip45.61.137.162
CC=NL ASN=AS399629 bl networks
ip45.77.119.13
CC=US ASN=AS20473 the constant company llc
ip52.185.157.28
CC=JP ASN=AS8075 microsoft corporation
ip62.234.24.38
CC=CN ASN=AS45090 shenzhen tencent computer systems company limited
ip64.95.11.95
CC=US ASN=ASNone
ip65.20.81.172
CC=CA ASN=AS20473 the constant company llc
ip65.49.235.210
CC=US ASN=AS25820 it7 networks inc
ip96.9.124.89
CC=CA ASN=AS30295 smartt inc.

Domain

ValueDescriptionCopy
domaintrycloudflare.com
—
domainsentinelones.com
—
domainaaa.ki6zmfw3ps8q14rfbfczfq5qkhq8e12q.oastify.com
—

Cve

ValueDescriptionCopy
cveCVE-2023-46747
—
cveCVE-2023-46805
—
cveCVE-2024-1709
—
cveCVE-2024-21887
—
cveCVE-2024-36401
—
cveCVE-2024-8963
—
cveCVE-2024-9379
—
cveCVE-2024-9380
—
cveCVE-2024-9381
—
cveCVE-2025-31324
—

Hash

ValueDescriptionCopy
hash708450f590eaf23e869080d09ed14e01
MD5 of 3f14dc65cc9e35989857dc1ec4bb1179ab05457f2238e917b698edb4c57ae7ce
hashbceccfa046cdbbf20e05541bdbc05439
MD5 of b9533ce8e428f16f3d0e1946f19a6f756ff11a532d0b7e61ae402837f46c678e
hashf3ce5cf045783c8c25aeff93e472cda1
MD5 of 47ff0ae9220a09bfad2a2fb1e2fa2c8ffe5e9cb0466646e2a940ac2e0cf55d04
hashf8a7ce4a8e2637565b18d6bb29b2bc6f
MD5 of 888e953538ff668104f838120bc4d801c41adb07027db16281402a62f6ec29ef
hash1657d9a2927e99f170732f6dd1b2a9a93944f3f4
SHA1 of b9533ce8e428f16f3d0e1946f19a6f756ff11a532d0b7e61ae402837f46c678e
hash714a3e45bf364bfb2ae6914663bef48d18412d1b
SHA1 of 47ff0ae9220a09bfad2a2fb1e2fa2c8ffe5e9cb0466646e2a940ac2e0cf55d04
hash88becd1d342cd701852218d633c7fc0d7a952547
SHA1 of 3f14dc65cc9e35989857dc1ec4bb1179ab05457f2238e917b698edb4c57ae7ce
hashbfee2fb825a0a813a1243ae59bb0f4c9f3545008
SHA1 of 888e953538ff668104f838120bc4d801c41adb07027db16281402a62f6ec29ef
hash00920e109f16fe61092e70fca68a5219ade6d42b427e895202f628b467a3d22e
—
hash0c2c8280701706e0772cb9be83502096e94ad4d9c21d576db0bc627e1e84b579
—
hash2dcbb4138f836bb5d7bc7d8101d3004848c541df6af997246d4b2a252f29d51a
—
hash3f14dc65cc9e35989857dc1ec4bb1179ab05457f2238e917b698edb4c57ae7ce
—
hash47ff0ae9220a09bfad2a2fb1e2fa2c8ffe5e9cb0466646e2a940ac2e0cf55d04
—
hash4c9e60cc73e87da4cadc51523690d67549de4902e880974bfacf7f1a8dc40d7d
—
hash5e24b41a0bd076ec2b4e49e66daac94396c6180d00a45bcd7f4342a385fa1eed
—
hash5f3d1f17033d85b85f3bd5ae55cb720e53b31f1679d52986c8d635fd1ce0c08a
—
hash63aa0c6890ec5c16b872fb6d070556447cd707dfba185d32a2c10c008dbdbcdd
—
hash888e953538ff668104f838120bc4d801c41adb07027db16281402a62f6ec29ef
—
hash91f66ba1ad49d3062afdcc80e54da0807207d80a1b539edcdbd6e1bf99e7a2ca
—
hashb8e56de3792dbd0f4239b54cfaad7ece3bd42affa4fbbdd7668492de548b5df8
—
hashb9533ce8e428f16f3d0e1946f19a6f756ff11a532d0b7e61ae402837f46c678e
—
hashc71da1dfea145798f881afd73b597336d87f18f8fd8f9a7f524c6749a5c664e4
—
hashf92d0cf4d577c68aa615797d1704f40b14810d98b48834b241dd5c9963e113ec
—

Url

ValueDescriptionCopy
urlhttp://103.30.76.206:443/slt
—
urlhttp://43.247.135.53/10443
—
urlhttp://43.247.135.53:10443
—

Threat ID: 682c992c7960f6956616ab5e

Added to database: 5/20/2025, 3:01:00 PM

Last enriched: 6/19/2025, 5:49:22 PM

Last updated: 9/27/2025, 5:35:26 PM

Views: 75

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats