Published on May 15, 2025. EST READ TIME: 2 minutes
Multiple China-linked advanced persistent threat (APT) groups are actively exploiting CVE-2025-31324, a critical unauthenticated file upload vulnerability in SAP NetWeaver’s Visual Composer component. This flaw enables remote code execution, allowing attackers to deploy web shells and maintain persistent access to compromised systems. Security researchers have identified at least 581 breached SAP instances, with targets spanning natural gas networks, water utilities, medical device manufacturers, and government agencies in countries including the UK, US, and Saudi Arabia.
The attacks have been attributed to Chinese APT groups such as UNC5221, UNC5174, and CL-STA-0048, who have used tools like KrustyLoader, SNOWLIGHT, and GOREVERSE to establish long-term access and exfiltrate data. SAP released a patch for the vulnerability on April 24, 2025, but many systems remain unpatched. Organizations are urged to apply the patch immediately and review their systems for signs of compromise.
North Korea's Lazarus Group Rakes in $3 Million: Unveiling Cybercrime's Financial Motivations
Read More 2 min read
Security Vulnerability: Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
Read More 2 min read
Indian Startup Hack-for-Hire: Navigating the Complexities of Ethical Hacking
Read More 2 min read
North Korean Hackers Pose as Job Recruiters in Cyber Espionage Campaign
Read More 2 min read
Analysis Reveals: Bad Bots Constitute a Staggering 73% of Internet Traffic
Read More 2 min read
Menu