Member-only story

Chinese Hackers’ SuperShell Heist: How CVE-2025–31324 Turns SAP Servers into Cyber Playgrounds 🕵️‍♂️💻

6 min read5 days ago

Imagine your company’s SAP NetWeaver server — handling everything from payroll to supply chains — suddenly becoming a hacker’s personal sandbox. That’s the chaos unleashed by Chinese hackers dubbed Chaya_004, who’ve been exploiting a critical zero-day flaw, CVE-2025–31324, to deploy a Golang-based backdoor called SuperShell. 😱 Uncovered by Forescout Vedere Labs and reported on May 8, 2025, this attack targets industries from energy to government, using sneaky webshells, fake Cloudflare certs, and Chinese cloud IPs to stay stealthy. With a CVSS score of 10.0, this is as bad as it gets. Let’s dive into the technical trickery, explore how SuperShell wreaks havoc, and share tips to lock down your SAP systems before these cyber ninjas strike! 🚨

Who’s Chaya_004, and What’s Their Game? 🤔

Chaya_004, a China-linked threat group, is a shadowy crew tied to state-sponsored espionage, per Forescout Vedere Labs. Since April 29, 2025, they’ve been weaponizing CVE-2025–31324, a flaw in SAP NetWeaver’s Visual Composer, to hit SAP servers worldwide. Their targets? Energy, utilities, manufacturing, media, government, and healthcare — basically anyone running SAP’s business-critical platform. 😈

--

--

Ismail Tasdelen
Ismail Tasdelen

Written by Ismail Tasdelen

I'm Ismail Tasdelen. I have been working in the cyber security industry for +7 years. Don't forget to follow and applaud to support my content.

No responses yet