NightEagle APT Targets China via Zero-Day Exchange Exploits

NightEagle APT Targets Microsoft Exchange Servers in China with Zero-Day Exploits, Focusing on Advanced Technology and Defense Sectors

  • A new threat group known as NightEagle (APT-Q-95) has targeted Microsoft Exchange servers in China using zero-day vulnerabilities.
  • The cyber attacks focus on government, defense, and technology organizations, especially in sectors like semiconductors, quantum technology, Artificial Intelligence, and military research.
  • NightEagle uses a modified version of the open-source Chisel tool, delivered through a custom .NET loader implanted into Microsoft Internet Information Server (IIS).
  • The attackers exploit an Exchange zero-day to obtain key credentials, allowing unauthorized access and data extraction from targeted servers.
  • Security researchers suggest the threat actor operates at night in China and may be based in North America, based on observed attack times.

Researchers have identified a previously unknown cyber espionage group, NightEagle, actively targeting Microsoft Exchange servers in China. This threat actor uses a chain of zero-day exploits to infiltrate organizations in the government, defense, and advanced technology sectors.

- Advertisement -

According to QiAnXin’s RedDrip Team, NightEagle has targeted companies in fields such as semiconductors, quantum technology, artificial intelligence, and military R&D. The group has operated since 2023, moving quickly between different network infrastructures and frequently updating its methods.

The research team began their investigation after finding a custom version of the Chisel penetration tool on a customer system. This tool was set to run automatically every four hours. Analysts explained in their report that the attackers altered the open-source Chisel tool, setting fixed usernames, passwords, and connecting specific ports between the compromised network and their command server.

The initial Malware is delivered through a .NET loader, which is embedded in the Internet Information Server (IIS) of the Exchange server. The attackers leverage an undisclosed flaw—a zero-day vulnerability—to retrieve the server’s machineKey credential. This lets them deserialize and load additional malware into any Exchange server of a compatible version, gaining remote access and the ability to read mailbox data.

A spokesperson for QiAnXin stated, “It seems to have the speed of an eagle and has been operating at night in China,” referencing the group’s operating hours and naming rationale. Based on activity patterns, investigators suspect NightEagle may be based in North America because most attacks occur between 9 p.m. and 6 a.m. Beijing time.

- Advertisement -

The findings were revealed at CYDES 2025, Malaysia’s National Cyber Defence & Security Exhibition and Conference. QiAnXin has notified Microsoft about the research for further action.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Tax Exemption Window Targets 2026, Report Says

The Bitcoin Policy Institute (BPI) is targeting a March-August 2026 window to pass a...

Meta to End Instagram Encrypted Chat in May

Meta will end encrypted Instagram chats after May 8, 2026.The move follows internal warnings...

Judge Blocks Trump Subpoenas for Fed’s Powell

A federal judge ruled that subpoenas from the Justice Department targeting Federal Reserve Chair...

Woz’s Crypto Token Plummets 99.9%

Efforce, an energy efficiency token project co-founded by Apple's Steve Wozniak, has lost over...

Ethereum Foundation Releases Mandate for Decentralized Future

The Ethereum Foundation published a mandate stating its core principles of censorship resistance, open...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...