Loading cryptocurrency prices...

Chinese Hackers Abuse Nezha Tool to Deploy Gh0st RAT Malware

Chinese-linked threat actors leverage Nezha tool to deploy Gh0st RAT malware via phpMyAdmin exploit across Asia-Pacific and beyond

  • Threat actors linked to China used the legitimate tool Nezha to deliver the Malware Gh0st RAT.
  • Attackers exploited a vulnerable phpMyAdmin panel and employed log poisoning to install a web shell.
  • More than 100 victim machines were compromised, mainly in Taiwan, Japan, South Korea, and Hong Kong.
  • The attack involved deploying ANTSWORD web shell and running commands remotely via Nezha.
  • The Nezha agent facilitated execution of PowerShell scripts to disable antivirus protections and run Gh0st RAT malware.

In August 2025, threat actors with suspected ties to China used an open-source monitoring tool called Nezha to deploy Gh0st RAT malware on compromised servers. The attackers exploited a publicly exposed phpMyAdmin panel, using a technique called log poisoning to plant a PHP web shell on the targets’ web servers.

- Advertisement -

This campaign affected over 100 machines, mostly located in Taiwan, Japan, South Korea, and Hong Kong, according to Cybersecurity firm Huntress. The attackers gained entry by setting the phpMyAdmin language to simplified Chinese and enabling SQL query logging, which allowed them to insert a web shell disguised as a log file with a .php extension.

Once the web shell was active, the threat actors used ANTSWORD to control the servers and deployed the Nezha agent, which can remotely execute commands on infected systems by connecting to an external control server. Huntress researchers Jai Minton, James Northey, and Alden Schmidt explained, “This allowed the threat actor to control the web server using ANTSWORD, before ultimately deploying Nezha, an operation and monitoring tool that allows commands to be run on a web server.”

The Nezha dashboard operated by the attackers was found running in Russian and showed more than 100 victim systems worldwide, including locations such as Singapore, Malaysia, India, the U.K., and the U.S. The deployed Nezha agent then enabled execution of PowerShell scripts that created exclusions in Microsoft Defender Antivirus. This action facilitated the launching of Gh0st RAT, malware commonly linked to Chinese Hacking groups.

Gh0st RAT is deployed via a loader and dropper that configure and start the main malicious process. Huntress noted that this case demonstrates how threat actors increasingly misuse legitimate public tools for malicious purposes due to their ease of use and ability to evade detection.

- Advertisement -

“While publicly available tooling can be used for legitimate purposes, it’s also commonly abused by threat actors due to the low research cost, ability to provide plausible deniability compared to bespoke malware, and likelihood of being undetected by security products,” the researchers concluded.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Zcash Proposes Dynamic Fee Market to Tackle Rising Transaction Costs

A developer for ZCash proposed a new dynamic fee market to replace the current...

JPMorgan’s Dimon Embraces Blockchain, Shifts Crypto View

JPMorgan CEO Jamie Dimon has revised his position on cryptocurrency and blockchain technology.Dimon now...

San Jose Widow Loses $1M in Crypto Romance Scam Warned by ChatGPT

A San Jose widow lost nearly $1 million in a crypto fake investment scam...

OCC Head: Crypto Banks Should Get Same Federal Charter as Others

Jonathan Gould of the Office of the Comptroller of the Currency (OCC) states crypto...

Tether Joins €70M Boost for Italian Humanoid Robot Startup

Tether invested in Italian humanoid robotics startup Generative Bionics during a €70 million (approximately...
- Advertisement -

Must Read

How to Buy Dedicated Hosting With Crypto

In this article I am going to show you how to buy dedicated hosting with crypto from one of the best European hosting providers...