Loading cryptocurrency prices...

NightEagle APT Targets China via Zero-Day Exchange Exploits

NightEagle APT Targets Microsoft Exchange Servers in China with Zero-Day Exploits, Focusing on Advanced Technology and Defense Sectors

  • A new threat group known as NightEagle (APT-Q-95) has targeted Microsoft Exchange servers in China using zero-day vulnerabilities.
  • The cyber attacks focus on government, defense, and technology organizations, especially in sectors like semiconductors, quantum technology, Artificial Intelligence, and military research.
  • NightEagle uses a modified version of the open-source Chisel tool, delivered through a custom .NET loader implanted into Microsoft Internet Information Server (IIS).
  • The attackers exploit an Exchange zero-day to obtain key credentials, allowing unauthorized access and data extraction from targeted servers.
  • Security researchers suggest the threat actor operates at night in China and may be based in North America, based on observed attack times.

Researchers have identified a previously unknown cyber espionage group, NightEagle, actively targeting Microsoft Exchange servers in China. This threat actor uses a chain of zero-day exploits to infiltrate organizations in the government, defense, and advanced technology sectors.

- Advertisement -

According to QiAnXin’s RedDrip Team, NightEagle has targeted companies in fields such as semiconductors, quantum technology, artificial intelligence, and military R&D. The group has operated since 2023, moving quickly between different network infrastructures and frequently updating its methods.

The research team began their investigation after finding a custom version of the Chisel penetration tool on a customer system. This tool was set to run automatically every four hours. Analysts explained in their report that the attackers altered the open-source Chisel tool, setting fixed usernames, passwords, and connecting specific ports between the compromised network and their command server.

The initial Malware is delivered through a .NET loader, which is embedded in the Internet Information Server (IIS) of the Exchange server. The attackers leverage an undisclosed flaw—a zero-day vulnerability—to retrieve the server’s machineKey credential. This lets them deserialize and load additional malware into any Exchange server of a compatible version, gaining remote access and the ability to read mailbox data.

A spokesperson for QiAnXin stated, “It seems to have the speed of an eagle and has been operating at night in China,” referencing the group’s operating hours and naming rationale. Based on activity patterns, investigators suspect NightEagle may be based in North America because most attacks occur between 9 p.m. and 6 a.m. Beijing time.

- Advertisement -

The findings were revealed at CYDES 2025, Malaysia’s National Cyber Defence & Security Exhibition and Conference. QiAnXin has notified Microsoft about the research for further action.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Theta Partners with Ulsan HD FC to Launch AI Fan Agent

THETA Network partners with Ulsan HD FC, South Korea’s football club and three-time K...

Semler Scientific Shareholder Sues to Block Strive Bitcoin Merger

A shareholder filed a lawsuit to block the merger of Semler Scientific and Strive,...

The 15 Best Crypto Advertising Networks to Grow Your Project

You've launched your crypto project. You've got the tech, the tokenomics, and maybe even...

71 Nations Dump Dollar as Gold Buying Surges, JPMorgan Warns

The share of U.S. dollar reserves worldwide has dropped below 60% for the first...

Bitcoin Risks Deeper Drop as $107K Support Faces Critical Test

Bitcoin’s recovery after Friday’s crash remains weak, with prices hovering just above a key...
- Advertisement -

Must Read

13 Best Bitcoin Casinos & Crypto Casinos

Online betting has always been a popular and easy option to play from the comfort of your home or on the go, and with...