A stealthy cyberattack discovered in August 2025 exploited a phpMyAdmin misconfiguration to launch a widespread infection campaign leveraging the Nezha monitoring tool and Ghost RAT malware. Initially appearing as a minor server issue, the attack rapidly escalated into a global intrusion campaign affecting over 100 systems across Taiwan, Japan, South Korea, and Hong Kong.
The attacker demonstrated exceptional technical proficiency by combining log poisoning, legitimate tool abuse, and stealthy malware deployment. Through these tactics, they transformed trusted administrative utilities into covert remote access tools, enabling sustained espionage and system control.
This campaign emphasizes how seemingly harmless open-source tools and misconfigured infrastructure can be weaponized into highly effective attack chains, turning ordinary systems into footholds for long-term infiltration and lateral movement.
The attack began when a phpMyAdmin database management panel was left publicly accessible due to a DNS misconfiguration that disabled authentication. The intruder accessed the panel from an AWS IP address in Hong Kong, switched the interface to Simplified Chinese, and executed SQL commands to confirm database control.
Exploiting a directory traversal flaw and misconfigured logging, the attacker used a technique known as log poisoning—injecting malicious PHP code into the MariaDB logs, effectively planting a hidden web shell. After confirming access, they pivoted IP addresses, possibly to evade detection or delegate control to another operator.
Once inside, the attacker downloaded and installed Nezha, a legitimate server monitoring utility, using an executable named live.exe hosted on Cloudflare. Though typically benign, Nezha was reconfigured to communicate with a command server in Dublin (HostPapa), using a Russian-language dashboard that lacked authentication. This reappropriation of Nezha gave attackers real-time visibility and remote control of compromised hosts.
In the final stage, Ghost RAT was deployed—a multi-stage remote access trojan featuring a loader, dropper, and main payload. It masqueraded as a Windows service named “SQLlite”, hiding within system directories. The malware maintained persistence, exfiltrated data, and communicated with MoeDove LLC infrastructure, previously associated with malicious domains and Chinese-linked threat actors.
The campaign’s precision, operational security, and infrastructure overlap strongly indicate a well-funded and organized actor, likely with state sponsorship or advanced criminal backing.
SHA256 Hashes
File Paths
URLs
IPv4 Addresses
Domains
Mutex
Get through updates and upcoming events, and more directly in your inbox