NightEagle APT Targets China via Zero-Day Exchange Exploits

NightEagle APT Targets Microsoft Exchange Servers in China with Zero-Day Exploits, Focusing on Advanced Technology and Defense Sectors

  • A new threat group known as NightEagle (APT-Q-95) has targeted Microsoft Exchange servers in China using zero-day vulnerabilities.
  • The cyber attacks focus on government, defense, and technology organizations, especially in sectors like semiconductors, quantum technology, Artificial Intelligence, and military research.
  • NightEagle uses a modified version of the open-source Chisel tool, delivered through a custom .NET loader implanted into Microsoft Internet Information Server (IIS).
  • The attackers exploit an Exchange zero-day to obtain key credentials, allowing unauthorized access and data extraction from targeted servers.
  • Security researchers suggest the threat actor operates at night in China and may be based in North America, based on observed attack times.

Researchers have identified a previously unknown cyber espionage group, NightEagle, actively targeting Microsoft Exchange servers in China. This threat actor uses a chain of zero-day exploits to infiltrate organizations in the government, defense, and advanced technology sectors.

- Advertisement -

According to QiAnXin’s RedDrip Team, NightEagle has targeted companies in fields such as semiconductors, quantum technology, artificial intelligence, and military R&D. The group has operated since 2023, moving quickly between different network infrastructures and frequently updating its methods.

The research team began their investigation after finding a custom version of the Chisel penetration tool on a customer system. This tool was set to run automatically every four hours. Analysts explained in their report that the attackers altered the open-source Chisel tool, setting fixed usernames, passwords, and connecting specific ports between the compromised network and their command server.

The initial Malware is delivered through a .NET loader, which is embedded in the Internet Information Server (IIS) of the Exchange server. The attackers leverage an undisclosed flaw—a zero-day vulnerability—to retrieve the server’s machineKey credential. This lets them deserialize and load additional malware into any Exchange server of a compatible version, gaining remote access and the ability to read mailbox data.

A spokesperson for QiAnXin stated, “It seems to have the speed of an eagle and has been operating at night in China,” referencing the group’s operating hours and naming rationale. Based on activity patterns, investigators suspect NightEagle may be based in North America because most attacks occur between 9 p.m. and 6 a.m. Beijing time.

The findings were revealed at CYDES 2025, Malaysia’s National Cyber Defence & Security Exhibition and Conference. QiAnXin has notified Microsoft about the research for further action.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

C&M Hack: $140M Stolen After Employee Sells Bank Credentials

A breach at C&M Software in Brazil led to the theft of $140 million...

Ondo Finance Acquires Oasis Pro, Gains Key US Regulatory Licenses

Ondo Finance acquires Oasis Pro Markets to expand its regulatory access for tokenized finance...

Theta Roundup June 2025: Major Updates, Sports & AI Expansion

EdgeCloud launched EdgeCloud Hybrid, enabling a decentralized GPU marketplace for both consumers and businesses. Houston...

Bitcoin Whale Moves $8.6B After 14 Years; 2011 Miner Suspected

A Bitcoin whale moved over 80,000 BTC, valued at more than $8.6 billion, after...

Ethereum NFT ‘Chimpers’ Launches Plush Keychains With 223 Collaboration

Chimpers, an Ethereum NFT collection, is introducing its first series of physical collectibles through...

Must Read

Top 7 BEST Crypto Trading Bots for Beginners

QUICK NAVIGATIONQuick Look: Top 3 Best Crypto Trading BotsWhat Exactly is a Crypto Trading Bot?How I Chose These Trading BotsTop 7 Crypto Trading Bots...