Chinese Hackers Leverage SAP RCE Vulnerability to Install Supershell Backdoors

A critical deserialization vulnerability, CVE-2025-31324, affecting SAP NetWeaver Visual Composer 7.x, is being actively exploited in the wild, according to recent research by Forescout.

The flaw allows unauthenticated remote code execution (RCE) via malicious uploads to the /developmentserver/metadatauploader endpoint, giving attackers the power to deploy web shells and take full control of vulnerable SAP servers.

Active Exploitation Threatens SAP

Since late April 2025, evidence has mounted of opportunistic scanning and exploitation attempts against SAP systems in multiple industries, with the most sustained campaigns traced to a Chinese-speaking threat group tracked by Forescout as Chaya_004.

The adversaries have leveraged the vulnerability not only to deploy classic web shells-such as helper.jsp, cache.jsp, or files with random eight-letter names-but also to install sophisticated management backdoors like Supershell, a Go-based remote shell favored among Chinese APT operators.

Forescout’s adversary engagement environments first detected mass scanning on April 29, shortly after public disclosure of the bug and its inclusion in CISA’s Known Exploited Vulnerabilities (KEV) catalog.

Scans targeting the vulnerable endpoint were predominantly sourced from Microsoft and Amazon cloud ASNs, likely reflecting both benign research activity and malicious reconnaissance.

More targeted exploitation was observed in customer environments, especially in the manufacturing sector, where attackers leveraged hosting services and VPNs provided by Scaleway (France), Contabo (Germany), Nubes (US), and ECO TRADE (Poland).

Several of these IPs had histories of credential-stuffing and brute-force attacks in broader campaigns.

Chinese-Linked Infrastructure

Technical analysis of campaign infrastructure revealed a sprawling network of over 500 IPs-many hosted on leading Chinese cloud providers such as Alibaba, Tencent, Huawei, and China Unicom-sharing a distinct self-signed digital certificate profile.

On these servers, researchers identified not just Supershell but an arsenal of penetration testing and asset discovery tools, including NPS (a Chinese-language intranet proxy), SoftEther VPN, NHAS, Cobalt Strike, asset reconnaissance utility ARL, Pocassit vulnerability scanner, Gosint intelligence collector, and bespoke tunnels written in Go.

This toolset, combined with consistent infrastructure patterns, strongly suggests the campaign is orchestrated by a seasoned Chinese threat actor.

Further lateral movement from compromised Visual Composer instances could enable attackers to compromise critical SAP modules, including Gateway, Message Server, or HANA databases, risking major business disruption, data leakage, regulatory violations, and credential theft.

In some environments, defensive scans themselves triggered system crashes-indicating that many SAP environments may be both highly exposed and poorly secured.

Immediate mitigation is imperative. SAP customers are urged to apply official patches released on April 2025 Patch Day for NetWeaver AS Java (versions 7.50–7.52).

Exposure of the vulnerable endpoint should be restricted using firewalls or SAP Web Dispatcher, and the Visual Composer service disabled unless strictly necessary.

Continuous monitoring for suspicious uploads and post-exploitation behavior-especially unusual POST requests and outbound connections-should be implemented.

Forescout has deployed threat detection and intelligence capabilities across its product suite, integrating IoCs and behavioral analytics to help organizations identify, respond to, and mitigate ongoing exploitation.

With active exploitation continuing and the threat landscape rapidly evolving, organizations running SAP NetWeaver Visual Composer are strongly advised to prioritize remediation and enhance monitoring for compromise.

Indicators of Compromise (IoC)

IoCDescription / Context
47.97.42[.]177Initial Supershell backdoor infrastructure host
49.232.93[.]226Malware distribution node; associated with svchosts.exe
8.210.65[.]56Automated penetration testing platform
search-email[.]comC2 domain used by malware sample
888e953538ff668104f838120bc4d801c41adb07027db16281402a62f6ec29efELF binary (“config”) recovered from an attack
f1e505fe96b8f83c84a20995e992b3794b1882df4954406e227bd7b75f13c779Windows malware sample (svchosts.exe)
(see below for additional scanning/exploitation IPs)Full list includes Microsoft, Amazon, Scaleway, Contabo, Nubes, and ECO TRADE ASNs
Subject DN: C=US, O=Cloudflare, Inc, CN=:3232Self-signed certificate profile for campaign infrastructure

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here