NightEagle APT Targets China via Zero-Day Exchange Exploits

NightEagle APT Targets Microsoft Exchange Servers in China with Zero-Day Exploits, Focusing on Advanced Technology and Defense Sectors

  • A new threat group known as NightEagle (APT-Q-95) has targeted Microsoft Exchange servers in China using zero-day vulnerabilities.
  • The cyber attacks focus on government, defense, and technology organizations, especially in sectors like semiconductors, quantum technology, Artificial Intelligence, and military research.
  • NightEagle uses a modified version of the open-source Chisel tool, delivered through a custom .NET loader implanted into Microsoft Internet Information Server (IIS).
  • The attackers exploit an Exchange zero-day to obtain key credentials, allowing unauthorized access and data extraction from targeted servers.
  • Security researchers suggest the threat actor operates at night in China and may be based in North America, based on observed attack times.

Researchers have identified a previously unknown cyber espionage group, NightEagle, actively targeting Microsoft Exchange servers in China. This threat actor uses a chain of zero-day exploits to infiltrate organizations in the government, defense, and advanced technology sectors.

- Advertisement -

According to QiAnXin’s RedDrip Team, NightEagle has targeted companies in fields such as semiconductors, quantum technology, artificial intelligence, and military R&D. The group has operated since 2023, moving quickly between different network infrastructures and frequently updating its methods.

The research team began their investigation after finding a custom version of the Chisel penetration tool on a customer system. This tool was set to run automatically every four hours. Analysts explained in their report that the attackers altered the open-source Chisel tool, setting fixed usernames, passwords, and connecting specific ports between the compromised network and their command server.

The initial Malware is delivered through a .NET loader, which is embedded in the Internet Information Server (IIS) of the Exchange server. The attackers leverage an undisclosed flaw—a zero-day vulnerability—to retrieve the server’s machineKey credential. This lets them deserialize and load additional malware into any Exchange server of a compatible version, gaining remote access and the ability to read mailbox data.

A spokesperson for QiAnXin stated, “It seems to have the speed of an eagle and has been operating at night in China,” referencing the group’s operating hours and naming rationale. Based on activity patterns, investigators suspect NightEagle may be based in North America because most attacks occur between 9 p.m. and 6 a.m. Beijing time.

- Advertisement -

The findings were revealed at CYDES 2025, Malaysia’s National Cyber Defence & Security Exhibition and Conference. QiAnXin has notified Microsoft about the research for further action.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

AI Stock Overvaluation Could Propel Bitcoin Higher: Analyst

Macro strategist Lyn Alden suggests Bitcoin's next major rally may depend on capital rotating...

Dubai, Maldives Advance Multi-Million Real Estate Tokenization

Dubai Land Department launched phase two of a real estate tokenization pilot following the...

Top Aave DAO Developer Quits in “Devastating” Split.

Bored Ghosts Developing, a key Aave DAO contractor, will not renew its contract in...

Bitcoin Whale Selling Dominates Despite Easing Sell Pressure

Bitcoin exchange deposits have dropped from a peak of 60,000 BTC in early February...

Idle GPUs Key to Easing AI Compute Crunch

GPU prices for AI workloads have surged dramatically, with the NVIDIA RTX 5090 up...

Must Read

9 DePIN Programs For Passive Income

Here’s something most people don’t realize: your smartphone and PC can generate passive income with almost no effort.I’m not talking about clicking ads for...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!