The Crown Prince, Nezha: A New Tool Favored by ChinaNexus Threat Actors

A sophisticated cyber intrusion campaign utilizing log poisoning and a new tool called Nezha has been uncovered. The attackers exploited a vulnerable phpMyAdmin interface to deploy a web shell, followed by the installation of Nezha, an open-source server monitoring tool repurposed for malicious activities. The campaign targeted over 100 victims, primarily in Taiwan, Japan, South Korea, and Hong Kong. The threat actors also deployed Ghost RAT, a remote access trojan, for further system compromise. The attack methodology and victimology suggest a China-nexus threat actor, highlighting the need for improved security measures and vigilance against emerging threats. Author: AlienVault

Related Tags:
log poisoning

Ghost RAT

Nezha

AntSword

china chopper

T1036.004

T1569.002

remote access trojan

T1547.001

Associated Indicators:
35E0B22139FB27D2C9721AEDF5770D893423BF029E1F56BE92485FF8FCE210F3

7B2599ED54B72DAEC0ACFD32744C7A9A77B19E6CF4E1651837175E4606DBC958

AD5E5B00F58396F5A518680E7084DC7DD5F2CC2B

6F336F372C5A642B57413363265E7D7E

D757EC4D5350843C44DD34A95DCB3A50

45.207.220.12

38.246.250.201

172.245.52.169