Chinese Hackers Abuse Nezha Tool to Deploy Gh0st RAT Malware

Chinese-linked threat actors leverage Nezha tool to deploy Gh0st RAT malware via phpMyAdmin exploit across Asia-Pacific and beyond

  • Threat actors linked to China used the legitimate tool Nezha to deliver the Malware Gh0st RAT.
  • Attackers exploited a vulnerable phpMyAdmin panel and employed log poisoning to install a web shell.
  • More than 100 victim machines were compromised, mainly in Taiwan, Japan, South Korea, and Hong Kong.
  • The attack involved deploying ANTSWORD web shell and running commands remotely via Nezha.
  • The Nezha agent facilitated execution of PowerShell scripts to disable antivirus protections and run Gh0st RAT malware.

In August 2025, threat actors with suspected ties to China used an open-source monitoring tool called Nezha to deploy Gh0st RAT malware on compromised servers. The attackers exploited a publicly exposed phpMyAdmin panel, using a technique called log poisoning to plant a PHP web shell on the targets’ web servers.

- Advertisement -

This campaign affected over 100 machines, mostly located in Taiwan, Japan, South Korea, and Hong Kong, according to Cybersecurity firm Huntress. The attackers gained entry by setting the phpMyAdmin language to simplified Chinese and enabling SQL query logging, which allowed them to insert a web shell disguised as a log file with a .php extension.

Once the web shell was active, the threat actors used ANTSWORD to control the servers and deployed the Nezha agent, which can remotely execute commands on infected systems by connecting to an external control server. Huntress researchers Jai Minton, James Northey, and Alden Schmidt explained, “This allowed the threat actor to control the web server using ANTSWORD, before ultimately deploying Nezha, an operation and monitoring tool that allows commands to be run on a web server.”

The Nezha dashboard operated by the attackers was found running in Russian and showed more than 100 victim systems worldwide, including locations such as Singapore, Malaysia, India, the U.K., and the U.S. The deployed Nezha agent then enabled execution of PowerShell scripts that created exclusions in Microsoft Defender Antivirus. This action facilitated the launching of Gh0st RAT, malware commonly linked to Chinese Hacking groups.

Gh0st RAT is deployed via a loader and dropper that configure and start the main malicious process. Huntress noted that this case demonstrates how threat actors increasingly misuse legitimate public tools for malicious purposes due to their ease of use and ability to evade detection.

- Advertisement -

“While publicly available tooling can be used for legitimate purposes, it’s also commonly abused by threat actors due to the low research cost, ability to provide plausible deniability compared to bespoke malware, and likelihood of being undetected by security products,” the researchers concluded.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Logan Paul Sells Pokémon Card for Record $16.5M

YouTuber Logan Paul sold a rare Pokémon card for a record $16.5 million, netting...

Nagel Backs Euro Stablecoins to Counter US Dollar Dominance

Joachim Nagel, president of Deutsche Bundesbank, advocates for a euro CBDC and stablecoins to...

Logan Paul’s Tokenization Firm Called ‘Multi-Layered Fraud’

Logan Paul is facing renewed "scammer" accusations for not sharing profits from the $16.49...

Bitcoin’s Historic Bear Run Nears 2018 Record Drop

Bitcoin trades at $67,621, down 1.70% in the last 24 hours and nearing its...

AI Agents Hacked by First-Ever Info-Stealer Malware

Information stealers are now targeting AI agent environments, successfully exfiltrating sensitive configuration files from...

Must Read

10 Best Bitcoin Debit Cards

You are reading this post because you want to get your hands on the best bitcoin debit card - right? Well, we got you covered. We...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!