Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Hackers Exploit GeoServer to Spread Malware

September 23, 2024
Reading Time: 2 mins read
in Alerts
Hackers Exploit GeoServer to Spread Malware

Chinese hackers, identified as the advanced persistent threat (APT) group Earth Baxia, have exploited a critical vulnerability in OSGeo GeoServer (CVE-2024-36401) to launch cyber-espionage campaigns across the Asia-Pacific (APAC) region. The attacks, detected in July 2024 by Trend Micro, targeted government and energy sectors in Taiwan, the Philippines, South Korea, Vietnam, and Thailand. Using spear-phishing emails and decoy documents in Simplified Chinese, the group infiltrated key industries, underscoring the persistent threat from state-sponsored hackers in the region.

The multi-stage attack chain began with phishing emails containing malicious ZIP files. Once opened, these files initiated the download of next-stage malware, including Cobalt Strike and a previously undiscovered backdoor, codenamed EAGLEDOOR. The malware enables information gathering, data exfiltration, and the deployment of additional payloads. Earth Baxia also used advanced injection techniques, such as GrimResource and AppDomainManager, to evade detection and maintain persistence within the victim networks.

The campaign shares notable similarities with tactics used by APT41, another Chinese APT group, including the use of cloud-based command-and-control (C2) domains that mimic Amazon Web Services, Microsoft Azure, and Trend Micro. The attackers leveraged these legitimate-looking domains to hide their malicious activities, making detection more difficult. Researchers noted that the overlap in infrastructure between Earth Baxia and APT41 suggests potential collaboration or shared resources.

The EAGLEDOOR malware supports multiple communication methods, including DNS, HTTP, TCP, and Telegram, with its core functionality relying on the Telegram Bot API for file upload, download, and payload execution. By exploiting widely used cloud services and employing sophisticated techniques, Earth Baxia’s operations highlight the increasing complexity of cyber threats in the APAC region, targeting critical industries and sensitive government data.

Reference:
  • Chinese Hackers Exploit GeoServer Flaw to Deploy EAGLEDOOR Malware
Tags: APTAPT41AsiaChinaCyber AlertsCyber Alerts 2024Cyber threatsespionageGeoServerHackersPhilippinesSeptember 2024South KoreaTaiwanThailandVietnam
ADVERTISEMENT

Related Posts

UNC6040 Vishing Group Target Salesforce Data

UNC6040 Vishing Group Target Salesforce Data

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

New Chaos RAT Variant Hits Windows and Linux

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

FBI Warns Hedera NFT Airdrop Crypto Scam

June 5, 2025
Crocodilus Trojan Steals Crypto Globally

Crocodilus Trojan Steals Crypto Globally

June 4, 2025
Crocodilus Trojan Steals Crypto Globally

Bogus CAPTCHA Lures Install NetSupport RAT

June 4, 2025
Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

June 4, 2025

Latest Alerts

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Bogus CAPTCHA Lures Install NetSupport RAT

Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

Subscribe to our newsletter

    Latest Incidents

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    Malaysia Home Minister WhatsApp Breached

    MainStreet Bank Faces Vendor Data Breach

    BitoPro Loses $11.5M In DeFi Hack Wave

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial